00001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) lseek(r2, 0xfffdfffffffffff7, 0x4) write$binfmt_misc(r2, 0x0, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000940)='./bus\x00', 0x1, 0x42) syz_open_dev$char_usb(0xc, 0xb4, 0x7) r4 = syz_genetlink_get_family_id$tipc(0x0) r5 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) write$P9_RRENAMEAT(r5, &(0x7f00000001c0)={0x7, 0x4b, 0x1}, 0x7) getpeername$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14) ioctl$sock_inet6_SIOCDELRT(r5, 0x890c, &(0x7f00000003c0)={@loopback, @loopback, @remote, 0x5, 0x80, 0x5, 0x100, 0x9, 0x80000100, r6}) sendmsg$TIPC_CMD_RESET_LINK_STATS(r2, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40600}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r4, 0x8, 0x70bd28, 0x25dfdbfb, {{}, 0x0, 0x410c, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4895}, 0x20000002) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r3, &(0x7f0000000a80)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000a40)={0x0}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) epoll_pwait(r3, &(0x7f00000001c0)=[{}, {}], 0x1, 0xa878, &(0x7f0000000280)={0x8f43}, 0x387) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r2, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000002c0)={0x0}}, 0x0) 03:33:56 executing program 0: ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8004700d, &(0x7f0000000040)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000300)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000000)) syz_mount_image$vfat(&(0x7f0000000200)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x6, 0x3, &(0x7f00000004c0)=[{&(0x7f00000002c0)="a32fdfeaa746be40d1e0eb8f2cb33cc22759b4b6c0343e6d", 0x18}, {&(0x7f0000000340)="a43d8e200b48d19367833951633122be88ee52028e87a2169e6066115e52c6a12ff6d855e90f82bf81ef60cb08322964948439d411aa904c6081c4fa32da90558a90752b9e2c152c4aa78ba8d20832daf8f626968b40f6dbd5780ee8d6462aa445", 0x61, 0xb54d}, {&(0x7f00000003c0), 0x0, 0x3}], 0x8, &(0x7f0000000500)={[{@shortname_mixed='shortname=mixed'}], [{@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5'}}]}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) r2 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r2, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket(0x10, 0x802, 0x9) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100)}], 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000400)="4cabaf0d9a70e354d278df33077fda68", 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, 0x0) write$cgroup_int(r3, &(0x7f0000000000), 0xffffff6a) pwrite64(r3, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000001300)={0x2880008, r3, 0x0, 0x8}) ioctl$KVM_GET_REGS(r4, 0x8090ae81, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:33:57 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='dummy0\x00', 0x10) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) 03:33:57 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0x28, 0x0, &(0x7f0000000180)) 03:33:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@ptr={0x0, 0x0, 0x0, 0x2, 0x2}, @restrict={0x0, 0x0, 0x0, 0xb, 0x3}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x4}}]}}, &(0x7f00000002c0)=""/178, 0x4a, 0xb2, 0x1}, 0x20) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mmap(&(0x7f00009ff000/0x600000)=nil, 0x600000, 0x0, 0x12, r0, 0x0) sendto$inet6(r0, 0x0, 0xfe32, 0xfffffefffffffffe, &(0x7f000006ffe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000002340)="8812", 0x2, 0x20000041, 0x0, 0x0) recvmsg(r0, &(0x7f0000000680)={&(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000080)=""/167, 0xa7}, {&(0x7f0000000140)=""/136, 0x88}, {&(0x7f00000003c0)=""/165, 0xa5}, {&(0x7f0000000480)=""/106, 0x6a}, {&(0x7f0000000500)=""/253, 0xfd}], 0x5, &(0x7f0000000200)=""/17, 0x11}, 0x41) 03:33:57 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='dummy0\x00', 0x10) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) 03:33:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000506090368fe07072b03003700000a0014000b00450001070300001419001a00120002000e0001000a000300"/57, 0x39}], 0x1) 03:33:57 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x101, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0xedc0) [ 490.551541] audit: type=1400 audit(2000000037.240:217): avc: denied { map } for pid=17676 comm="syz-executor.4" path="socket:[62285]" dev="sockfs" ino=62285 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=tcp_socket permissive=1 03:33:57 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x303, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket(0x0, 0x80002, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB], 0x1}}, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x200000, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@gettaction={0x20, 0x32, 0x121, 0x0, 0x0, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc}]}, 0x20}}, 0x0) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r2) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0x4008ae89, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x800002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xb202000000000000, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="8000f1f63804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 03:33:57 executing program 3: socketpair(0x26, 0x5, 0x400, &(0x7f00000015c0)) [ 490.658817] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.5'. 03:33:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$overlay(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[]) open(&(0x7f0000000040)='./file0\x00', 0x8d09c44a4b7315a3, 0x42) 03:33:57 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r3, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:33:57 executing program 3: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000000)=0x7ff, 0x4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) recvmmsg(r0, &(0x7f0000002600)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000bc0)=""/96, 0x60}}], 0x1, 0x0, 0x0) [ 490.859053] tc_dump_action: action bad kind [ 490.913140] raw_sendmsg: syz-executor.3 forgot to set AF_INET. Fix it! [ 490.929742] overlayfs: fs on 'file0' does not support file handles, falling back to index=off. 03:33:57 executing program 0: ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8004700d, &(0x7f0000000040)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000300)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000000)) syz_mount_image$vfat(&(0x7f0000000200)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x6, 0x3, &(0x7f00000004c0)=[{&(0x7f00000002c0)="a32fdfeaa746be40d1e0eb8f2cb33cc22759b4b6c0343e6d", 0x18}, {&(0x7f0000000340)="a43d8e200b48d19367833951633122be88ee52028e87a2169e6066115e52c6a12ff6d855e90f82bf81ef60cb08322964948439d411aa904c6081c4fa32da90558a90752b9e2c152c4aa78ba8d20832daf8f626968b40f6dbd5780ee8d6462aa445", 0x61, 0xb54d}, {&(0x7f00000003c0), 0x0, 0x3}], 0x8, &(0x7f0000000500)={[{@shortname_mixed='shortname=mixed'}], [{@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5'}}]}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) r2 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r2, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket(0x10, 0x802, 0x9) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100)}], 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000400)="4cabaf0d9a70e354d278df33077fda68", 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, 0x0) write$cgroup_int(r3, &(0x7f0000000000), 0xffffff6a) pwrite64(r3, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000001300)={0x2880008, r3, 0x0, 0x8}) ioctl$KVM_GET_REGS(r4, 0x8090ae81, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:33:57 executing program 2: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007ff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) futimesat(r0, 0x0, &(0x7f0000000180)={{0x0, 0x2710}, {0x0, 0x2710}}) 03:33:57 executing program 3: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) unshare(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RLOCK(r0, &(0x7f0000000180)={0x8, 0x35, 0x1}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000400)) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000080), 0x0) ioctl$BLKSECDISCARD(r0, 0x127d, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x9, 0xb, 0x6, 0xc}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r1, &(0x7f0000000380)="1934c259e95977a8ee32d95a7e2e0ad9e8fafe9138c0ca26b9371840a474a7f9e198f2b5067205916eae1230ad9783d47c6323ab00b431432ff564c64a52838992e48d39abcef19e28ad84d3d37af972b29b837cef4f8e5f9c80ee5dfaf03f622a"}, 0x10) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 03:33:57 executing program 5: bind$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001f80)=[{{0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) ioctl$KVM_SET_NESTED_STATE(0xffffffffffffffff, 0x4080aebf, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='cmdline\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 03:33:58 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x5, 0x0, &(0x7f0000000140)) 03:33:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev, 0x8}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, 0x1b) 03:33:58 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x2, 0x4, 0x4, 0x100000009}, 0x2c) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e27}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x18) [ 491.574899] tc_dump_action: action bad kind 03:33:58 executing program 4: mkdir(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f0000000280)='./file0\x00', 0x1) 03:33:58 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r3, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:33:58 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x1686c970805bc38}}, 0x0) r0 = socket(0x6000000000010, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)="3100000013000900690006342fc56aef40be44081000000046000107000000540d0003c0256465a3000000002075702e1a", 0x31}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492540, 0x0) 03:33:58 executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@ipv6_newroute={0x30, 0x18, 0x1, 0x0, 0x0, {}, [@RTA_PRIORITY={0x8, 0x1e}, @RTA_MULTIPATH={0xc}]}, 0x30}}, 0x0) r0 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) 03:33:58 executing program 5: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x0, @loopback}, 0x10) [ 491.694813] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 03:33:58 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x2, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffb5}, [@ldst={0x3, 0x0, 0x3, 0x1c10a1}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) 03:33:58 executing program 3: syz_open_dev$rtc(0x0, 0x7f, 0xce2c5de6eb4cb018) fchmod(0xffffffffffffffff, 0x36) syz_open_procfs(0x0, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x40) pipe2(&(0x7f0000000140), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) eventfd(0x101) syz_open_procfs(0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 03:33:58 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mknod(&(0x7f00000001c0)='./file0\x00', 0x200001040, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)=0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x4, 0x70, 0x5, 0x8, 0x3, 0x2, 0x0, 0x9, 0x40, 0x0, 0x0, 0x0, 0x0, 0x143, 0x0, 0x0, 0x6, 0x6, 0x8, 0x81, 0x3, 0x5, 0x5, 0x0, 0x0, 0x0, 0x1, 0x8, 0x5, 0x0, 0x0, 0x4, 0x0, 0x8, 0x40, 0x1, 0x9, 0xc64, 0x0, 0x67932ca7, 0x1, @perf_config_ext={0xa20a, 0x80000001}, 0x0, 0x0, 0x3ff, 0x2, 0x0, 0xfffffffffffffffc, 0x7f}, r2, 0x0, r1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xf) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x11, &(0x7f00000002c0)=0xffffffffffffffff, 0xfffffdff) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x24e23, @local}, 0x10) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0x1d0, 0x6, 0x6, 0x7f, 0x0, 0x4, 0x40010, 0x0, 0xffffffffffffffff, 0x9, 0x0, 0xb82, 0x6, 0x7, 0x335, 0x6, 0x80000001, 0x8, 0x8, 0x7fff, 0xffffffff, 0x400, 0x0, 0x3, 0x7, 0x10000, 0x1000, 0x3, 0x8001, 0xb0, 0x1052, 0xffffffff00000000, 0xfff, 0x200, 0x3, 0x20, 0x0, 0x8, 0x5, @perf_config_ext={0x4, 0x4}, 0x0, 0x0, 0x5, 0x6, 0x400, 0x947, 0x6}, r2, 0x0, r1, 0x9) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES64], 0xc63b9e35) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x11, &(0x7f0000002a80), &(0x7f0000002ac0)=0x4) gettid() openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) r3 = inotify_init() inotify_add_watch(r3, &(0x7f0000000480)='./file0\x00', 0x80000040) 03:33:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) ioctl$KVM_SET_TSC_KHZ(r0, 0xaea2, 0x0) r1 = socket(0x1, 0x1, 0x0) syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) r2 = open(0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, 0x0, 0x0) ioctl$PIO_FONTX(r2, 0x4b6c, 0x0) r3 = syz_open_dev$ndb(0x0, 0x0, 0x40) ioctl$NBD_SET_SOCK(r3, 0xab00, r1) ioctl$NBD_DO_IT(r3, 0xab03) 03:33:58 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x80040, 0x0) stat(0x0, &(0x7f0000000b80)) getresgid(&(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80)=0x0) fstat(0xffffffffffffffff, &(0x7f0000000dc0)) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x669, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000004c0)='\'\xc4-\v\xec\xe4\t\xc5r\x12-\x90\xda\x9a\x94\x02\xec\xea\x10\x90\x03\xcb\xf8\x1b6\xa5t\xd6\xd3\x93\xd3\xdf\x85P\x19G7Q\v\xdcHv\x03Qa\xf3\xd4\xfc(\x83\xfb\xf8C\xf6\x8a$\xb1\x90\xeb\'~\xa0\xd8\xc8\xe8\x94#\xcd\xd5!p\xbf\xc0\x8d7\x1b?A(\xe8^\x9c\xff\x0f\x1ck\xbc\x95\x05\xcd!\xf7\x15o\xd4\xdc4\x84uw\xa6w\x0f\xea`1\xec\xb4\x04\xd5\r\x8d\xde\x1f]\x15\xe5\xe8\xd00\xe5\x8d\x9c\x9ec+\x02\x1d\xffa5\x94\xab\xddNe\xfe\x8c\xc4q\xbb#f\xc1\xb9\x81W\xa4$)!\v\x9b\xa7\b\x91\xe5\xeb\x88\x1c\x0f\xb2.Tr\xe4\x99\x9e\x03\xb4\xd2\xf9KW\xce\xd1cC\xd5\xcf\x97\xa9\xeab\xda\xd6:\xa91q\xf7\xc5\xc0C\xd1\'\x89\xee\x84T:\x88x\xe2\x83\xf2r\xf4&t@\x9e\xa4qf\xdf\xf4\xb5\x01\\a\x85\xd3\xe0\xb7\n\xe7\xed\x84Q\xd7s\xcd4B\xcbQ\xa4\x9f[\x99\xdfJ%\xa8\xfc\xe3`\xc1\x0fy\x12\x181\xa5|8\xc8\xe7\x9f@\xeb:\nJA\xc9\xbc\xd4~}\xce\xe8\xfejH\x8fb\xdd\xbcJ\vk\'\xe7Q\xfd\xaaA`\xb5\xa1\xe4\xf8\x9eG\xcfb\xe8@\x04\xe1\xf8\xacU)(S\xed\xffA\xfaqt\xb6$e\n\xc7\x9b\xb0X\xb6\xd4\t\x99^^\xc2>J\x16\xd0\x8c\xecy*\xa0\a\xe9Ar\xa6\xb4n9j\xe5\xba\x8a\n\xce2\xcf_\x1b.t)\x8d09A[-\xf6\xe7\xe8\x1f\x92>\xb8\xd4>-\xacY\x9e\x88\x96\xa7\xfa\xdaoL\xa6\xec\xe8\xd5\xbfaf\xd7\xfc\x03\x91w)\xcd\x1f\xbe\xc9R\xcfz\x03\xec\br\x83\x8bM-\xf8X\xfd\"\xb4RV\x7f\xda\xd3\xd4h\x1c\xdb\xbe\xa4U\xec\xcd\'\xbc\xd22\x85{,\xe6-,6\x9d\x85\xb4fL\b\x98\xe9@\xee\xc2.\xb3\xd6w\x10\x94\xb5%D\xe8\r\xfe\x98G\x82\fx,\xa2J\x12\x03ec\xd5e-\x1f6\xe7\xb6\xd9\xcf0J\xed\xb7\x9b\xfd\xfc\x00EQ\x1f\x00D\xc95\xdeG +\x1bp\xf4\t\x94\x87\xf1ZbO\xa6\xe9\f`u\xda\xb3\x1d\xf9\x94\x80\xc1\x17\xde(_\xa7\xe7\x11\x9a\xac\x8c\xb1\xd71\xc5\xe9\xd3n\xc2\xa4\x98P\x9aF\xc2\x93\xad@\xa9h\x96\x1b]2\x88\xf3\xd8\xc798\x8c\x9f\xd4W4\xf1}\aD\xa0\xd8\xda\xf4\x1bEx(t|\xf4Y\xfaJ\xc2GS\xc9R\xb5\xda\xa8\x9b\xaa\x01\xe2~\xd8f.#\x94\xbf\x85z\xbf\xa0x62L\x1f\x91\xd2\x1e%\x88\x1f\f\xabb\x8ds\x93\x9e\xed\xd2\xdb\x02\x0e\xcf\xf5\xaf\xc8>+\x03e\xb7\xba\xb9}\xca\xfc\xe8\xed\x9b\xa2\x9ey\bMv\x8f\x8a8\xfd;\x9a5J\xee\x9a\xae\x83>$\x8a6\x05P\x8c\x05\xb8\r\xcf\xdd\x15/\xa9\xa1\xd4\x87{\xc9I4\xe3 i\xa4\xc5\xe5l\x03?\xfdM&\xc0a9}h\x8ef\x10!\xf0\x99\x80\xb72\xcc\x06\'+\xf0\xa1\a\xeeSGH\x12\x068S7s\xd3\xdaT\"\xa9jk\xed\xa2IyM\xa3&t\xfeA\xa9\"\xb4\xec\xdex\x00\x80`p\x91\x84\xbfK\xb6\x00\xa7\xa2\x06\xce\xc8X\x7f\xd1@\xf1\xcf\xdf\xae\xdb\r\xf6h\xdf\xc6+\xac\r\x9f\xc2D\xdf\xd6\xde`\xa4\xf4\xbe#\tH\x06;a(`\xdcw\x1dc_\v\x046j\xf9`\r\xc0\a\x8d\x12:l\xc7j3E\xd7\xcaX\x97\xad\x93\xea\x99\xca\xd7m\xb8\x1e1\xb6Nz\"U/\x0eP\b=\x01W\xcd\xf1x\x85\xf4&\xe7\xf9W\x06\xa4\xf8&\xbc\xf4\xd0\xd2\xd1W\xee\x9a\xdd\xdbu\x0e\x9aV\xe2\xc5\x84`Bu\x12\xa8/=\x17\xc4F\x11\xdfm-)\xd9hc\xba\xb7\x91\xd9\x11\x9a,\x19\xf4]\xa7Y@B\x1f]\x97\x9f\xc2') ioctl$void(r3, 0x5451) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000fc0)=ANY=[@ANYBLOB="02000000010001", @ANYRES32, @ANYBLOB="02000400", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="020006", @ANYRES32, @ANYBLOB="0200", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYRES32=r2, @ANYBLOB='\b\x00', @ANYBLOB="008000af2a875771022594000008000063f83730128e3f0f21c5f694fbfbd81dc921a508192ba296087dc89325b6d2eae0c08788b93c26b9bcd36bd985980400379434165a2b2f0ed9c0584160a355e4d1d2926d6bb5a221f49ab46b4423f731e707658fb476496daea3d271cb6e858e39d378910d430f77c42f9be85a572213c10ce12f49e500a2b2990a57fcfdeb0e7930dd5bde130ccc758906542b6de842eb"], 0x11, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x8000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000004c0)={{{@in6, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) mount$overlay(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000340)='overlay\x00', 0x40, &(0x7f00000003c0)={[{@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_off='nfs_export=off'}, {@workdir={'workdir', 0x3d, './file0'}}, {@xino_on='xino=on'}, {@default_permissions='default_permissions'}], [{@dont_appraise='dont_appraise'}, {@euid_eq={'euid'}}]}) clock_gettime(0x0, &(0x7f0000000e80)={0x0, 0x0}) rt_sigtimedwait(&(0x7f0000000e40)={0xffdfffff}, 0x0, &(0x7f00000002c0)={r4, r5+10000000}, 0x8) rt_sigreturn() ioctl$MON_IOCH_MFLUSH(r1, 0x9208, 0x6) 03:33:58 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r3, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x0, 0x0, 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:33:59 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xe, 0x4, 0x4, 0xffffffffffffe4a5, 0x0, 0x1}, 0x3c) [ 492.345190] block nbd2: Receive control failed (result -22) [ 492.351682] overlayfs: unrecognized mount option "nfs_export=off" or missing value [ 492.388893] block nbd2: shutting down sockets 03:33:59 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) stat(&(0x7f0000000b40)='./file0\x00', &(0x7f0000000b80)) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x8000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(0x0, &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f0000000000)=@routing={0x0, 0x2, 0x4, 0x0, 0x0, [@mcast2]}, 0x18) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000680)=ANY=[@ANYBLOB="0100000000000000b4f99c38d2659b100000000000000000000000000000000000000000000000008d00000000000042a0e15549007ccd000000000000000000000000000000000000000000000000008e670c3d4be40904c42e2dbd5079837928c07e9480042808c9374daaa5f24072cc364c46a743ca93f18fb1fd6118e43dff50e7ee52f9"]) rt_sigtimedwait(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 492.463022] block nbd2: Receive control failed (result -22) [ 492.474066] block nbd2: shutting down sockets 03:33:59 executing program 2: set_mempolicy(0x1, 0x0, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) clone(0x80000, 0x0, 0x0, 0x0, 0x0) 03:33:59 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x9) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x31, &(0x7f0000000080)=0xbf, 0x4) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000000c0)=0x580, 0x162) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) recvmsg(r1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/36, 0x3c4}, 0x2000) sendmmsg(r0, &(0x7f00000000c0), 0x182, 0x0) 03:33:59 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r3, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x0, 0x0, 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:33:59 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioperm(0x2, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) fcntl$getownex(r0, 0x10, 0x0) removexattr(0x0, 0x0) gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'hsr0\x00'}) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x400000) exit_group(0x0) waitid(0x1, 0x0, &(0x7f0000000200), 0x8, &(0x7f0000000280)) syz_emit_ethernet(0x36, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x15da1eb41b59a232}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 03:33:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0x10, 0x80002, 0x0) lstat(0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'syz_tun\x00', 0x0}) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000008c0)=ANY=[@ANYBLOB="5200000024000b0500000000000000edffffff00", @ANYRES32=r3, @ANYBLOB="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"], 0x74}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x3, 0x1000000000000, &(0x7f0000000080), 0x0, &(0x7f0000000100)}], 0x492492492492642, 0x0) 03:33:59 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioperm(0x2, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) fcntl$getownex(r0, 0x10, 0x0) removexattr(0x0, 0x0) gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'hsr0\x00'}) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x400000) exit_group(0x0) waitid(0x1, 0x0, &(0x7f0000000200), 0x8, &(0x7f0000000280)) syz_emit_ethernet(0x36, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x15da1eb41b59a232}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 03:34:00 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r2, 0x11, 0x67, 0x0, &(0x7f0000000080)) 03:34:00 executing program 3: syz_open_dev$rtc(0x0, 0x7f, 0xce2c5de6eb4cb018) fchmod(0xffffffffffffffff, 0x36) syz_open_procfs(0x0, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x40) pipe2(&(0x7f0000000140), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) eventfd(0x101) syz_open_procfs(0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 03:34:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0x10, 0x80002, 0x0) lstat(0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'syz_tun\x00', 0x0}) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000008c0)=ANY=[@ANYBLOB="5200000024000b0500000000000000edffffff00", @ANYRES32=r3, @ANYBLOB="00000014f1ffffffffffffff0800010073667100480002000000800080b9a00400000000000000000000030000000033cc3598c9aa8178bdf1000000000000000001000000de7f4687080000000040000000000001009900007c24f1583940ea0e363002e94564838f54825863fe646c248656cb5da45549c5ceffcf034fbd32262c964c61f3771603fd386dc70a77e574632bd950e808d63007d6c62595771d69479b29ccc416a292528d7d2bef3b8444b636cd5270810633f2eb7d7a89d0f3cf2074bb29180708593e5692926dfe7b7bc2cbc705ed95700983ea22eefa47c53252758e28ba5302e15a6383b480de19f886aff40a0cb6088e18f3326fa3a5dcd32cb9515a688b87961591b4671e40cf37feaa14dd00000000007672c400321e6e4daef23cf875a45a0643142ac688f2a10d2a194d7079ce17e9d3da5da7ecf526f153140e6740200000b3c3c00b656f9021957cb27486eea0345bdf43b770452e1353b948847af1b8167f7f12dd7e160ab1357707dacc631c883bf5f5149ba82201d8fcf571465e515d18f9e1797a7304cd27f232de351ba82f19b56615d6bb584a3dfdff070000d44e60efd73e28c85c3f602e6ff893a5d0fbe9451fac0d80cfd54b4d6c95bc6f82c1d43695be529f12dcf9064f0b64a144b207ea2d383b5e0109b82309b6481bab49d6fb474cee7c43c6094016a88291780000000000000000000000ebd1d914"], 0x74}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x3, 0x1000000000000, &(0x7f0000000080), 0x0, &(0x7f0000000100)}], 0x492492492492642, 0x0) 03:34:00 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioperm(0x2, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) fcntl$getownex(r0, 0x10, 0x0) removexattr(0x0, 0x0) gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'hsr0\x00'}) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x400000) exit_group(0x0) waitid(0x1, 0x0, &(0x7f0000000200), 0x8, &(0x7f0000000280)) syz_emit_ethernet(0x36, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x15da1eb41b59a232}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 493.270293] net_ratelimit: 20 callbacks suppressed [ 493.270298] protocol 88fb is buggy, dev hsr_slave_0 [ 493.281223] protocol 88fb is buggy, dev hsr_slave_1 [ 493.286694] protocol 88fb is buggy, dev hsr_slave_0 [ 493.292356] protocol 88fb is buggy, dev hsr_slave_1 03:34:00 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r3, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x0, 0x0, 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:34:00 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) stat(&(0x7f0000000b40)='./file0\x00', &(0x7f0000000b80)) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x8000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(0x0, &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f0000000000)=@routing={0x0, 0x2, 0x4, 0x0, 0x0, [@mcast2]}, 0x18) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000680)=ANY=[@ANYBLOB="0100000000000000b4f99c38d2659b100000000000000000000000000000000000000000000000008d00000000000042a0e15549007ccd000000000000000000000000000000000000000000000000008e670c3d4be40904c42e2dbd5079837928c07e9480042808c9374daaa5f24072cc364c46a743ca93f18fb1fd6118e43dff50e7ee52f9"]) rt_sigtimedwait(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 03:34:00 executing program 4: perf_event_open(&(0x7f0000000040)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x840000000002, 0x3, 0x200000000000ff) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'bridge_slave_0\x00', &(0x7f0000000000)=@ethtool_eeprom={0x2b}}) 03:34:00 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioperm(0x2, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) fcntl$getownex(r0, 0x10, 0x0) removexattr(0x0, 0x0) gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'hsr0\x00'}) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x400000) exit_group(0x0) waitid(0x1, 0x0, &(0x7f0000000200), 0x8, &(0x7f0000000280)) syz_emit_ethernet(0x36, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x15da1eb41b59a232}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 03:34:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2103001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x18, 0x4, 0x2, 0x0, 0x1, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000], 0x0, 0xffffffffffffffff, 0x1, 0x1f}, 0x3c) writev(0xffffffffffffffff, 0x0, 0x0) 03:34:00 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioperm(0x2, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) fcntl$getownex(r0, 0x10, 0x0) removexattr(0x0, 0x0) gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'hsr0\x00'}) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x400000) exit_group(0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x15da1eb41b59a232}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 03:34:00 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='attr\x00') getdents64(r0, &(0x7f0000000100)=""/179, 0x2c9) getdents64(r0, 0x0, 0x0) 03:34:00 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x1600bd7d, &(0x7f0000000040)={'mangle\x00', 0x2, [{}, {}]}, 0x48) 03:34:00 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, &(0x7f00000000c0)='./file0\x00') perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000540)='user\x00', &(0x7f0000000580)={'syz', 0x1}, &(0x7f00000005c0)="a1deb09fb229f3e327206d312b9d2546ceb8e2851ac20115cf87f51f3bceaf704bfaf2847ce9b975dd9a72c93ed3608d5f3634b81ebcdb1b0c218171c1ca41cb4eb76df433e3c78e7c3e476f2d5117e90b5854cd0dbc44ac612e54b997f643e61d47a59cc0943702650117c34b47a5a20dea48101102dba38c08dbaf98f16cc56d241d8d8a91caebb1710ec44ced951875b10f9585db7b9bd907aba85b69a7a66e86b3e9e6c5b234ea8b4d628994", 0xae, 0xfffffffffffffffb) keyctl$get_keyring_id(0x0, r1, 0x0) keyctl$setperm(0x5, r1, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200), 0xc) rmdir(&(0x7f0000000240)='./file0//ile0\x00') ioctl$int_out(0xffffffffffffffff, 0x810080804537, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000880)=ANY=[@ANYBLOB="0000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000009000000080000001f0000000000000002000000000000002200000000000000030000000000000000000000000000000000000000000000000000000000000000000000010000001f00000d090000000200000000000000060000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000997800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d76100000006000000000000000000000000000000000000000000000000f98f4d6c4e57eb17ac2b55f786028e996d572b98684b2805f1b6095f8314cc24cfa42b67eb1fc64fc6b3c1f3c9420399529ed537d8fb3e7cd3a6a34eb6a136d5c930b52940b5c64471e64b056928fb46b0056e83a2332dcb3549dd3a981300e61a109045361beb621de298d02f9671527795d3a0c10595c435905f14ec"]) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) r2 = socket(0x10, 0x2, 0xc) r3 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000001, 0x81}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r2, &(0x7f0000000140)="1f0000000104ff00fd435463e4af645515b81e0008000100010423dcffdf00", 0xea) dup3(r3, r2, 0x0) r4 = dup(r2) ioctl$IOC_PR_PREEMPT_ABORT(r4, 0x401870cc, &(0x7f0000000140)={0xfffffffffffffffa, 0x2, 0x0, 0x20000}) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x8000000007) getgid() pipe(&(0x7f0000000000)={0xffffffffffffffff}) setsockopt$inet6_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000080)=@ccm_128={{0x304}, "e24e2d0bfd9e6593", "0e223a5261be4811816fb192a319b75a", "551a265b", "54f9008f42eb03d4"}, 0x28) mount$fuse(0x0, 0x0, &(0x7f00000001c0)='fuse\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r6 = socket(0x10, 0x2, 0xc) r7 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r6, &(0x7f0000000140)="1f0000000104ff00fd435463e4af645515b81e0008000100010423dcffdf00", 0x1f) dup3(r7, r6, 0x0) r8 = socket(0x10, 0x2, 0xc) r9 = perf_event_open(&(0x7f0000000280)={0x2, 0x305, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x40, 0x400000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r8, &(0x7f0000000140)="1f0000000104ff00fd435463e4af645515b81e0008000100010423dcffdf00", 0x1f) dup3(r9, r8, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r8, 0x0, 0x10, &(0x7f0000000780)={{{@in=@remote, @in=@dev}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001c80)={'team0\x00'}) [ 493.600127] protocol 88fb is buggy, dev hsr_slave_0 [ 493.605277] protocol 88fb is buggy, dev hsr_slave_1 [ 493.831203] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 03:34:00 executing program 3: syz_open_dev$rtc(0x0, 0x7f, 0xce2c5de6eb4cb018) fchmod(0xffffffffffffffff, 0x36) syz_open_procfs(0x0, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x40) pipe2(&(0x7f0000000140), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) eventfd(0x101) syz_open_procfs(0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 03:34:00 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioperm(0x2, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) fcntl$getownex(r0, 0x10, 0x0) removexattr(0x0, 0x0) gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'hsr0\x00'}) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x400000) syz_emit_ethernet(0x36, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x15da1eb41b59a232}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 03:34:00 executing program 5: munmap(&(0x7f00007fa000/0x2000)=nil, 0x2000) r0 = syz_open_procfs(0x0, &(0x7f00000012c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f00000000c0)='mem\x00\x01y7SwaS.\x06\x95r\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r3, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 493.879150] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. [ 493.906163] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. [ 493.934929] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. [ 493.955603] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 03:34:00 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioperm(0x2, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) fcntl$getownex(r0, 0x10, 0x0) removexattr(0x0, 0x0) gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'hsr0\x00'}) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x400000) syz_emit_ethernet(0x36, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x15da1eb41b59a232}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 493.980371] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 03:34:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000200)={@dev}, 0x14) syz_emit_ethernet(0x4e, &(0x7f0000000000)={@random="cd38ffe40f97", @random="1a9f4d266427", [], {@ipv6={0x86dd, {0x0, 0x6, "e30600", 0x18, 0x40000000003a, 0x43ff, @ipv4={[], [], @remote}, @mcast2, {[], @icmpv6=@mld={0x87, 0x0, 0x0, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffff0a000000}}}}}}}, 0x0) 03:34:00 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, &(0x7f00000000c0)='./file0\x00') perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000540)='user\x00', &(0x7f0000000580)={'syz', 0x1}, &(0x7f00000005c0)="a1deb09fb229f3e327206d312b9d2546ceb8e2851ac20115cf87f51f3bceaf704bfaf2847ce9b975dd9a72c93ed3608d5f3634b81ebcdb1b0c218171c1ca41cb4eb76df433e3c78e7c3e476f2d5117e90b5854cd0dbc44ac612e54b997f643e61d47a59cc0943702650117c34b47a5a20dea48101102dba38c08dbaf98f16cc56d241d8d8a91caebb1710ec44ced951875b10f9585db7b9bd907aba85b69a7a66e86b3e9e6c5b234ea8b4d628994", 0xae, 0xfffffffffffffffb) keyctl$get_keyring_id(0x0, r1, 0x0) keyctl$setperm(0x5, r1, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200), 0xc) rmdir(&(0x7f0000000240)='./file0//ile0\x00') ioctl$int_out(0xffffffffffffffff, 0x810080804537, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000880)=ANY=[@ANYBLOB="0000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000009000000080000001f0000000000000002000000000000002200000000000000030000000000000000000000000000000000000000000000000000000000000000000000010000001f00000d090000000200000000000000060000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000997800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d76100000006000000000000000000000000000000000000000000000000f98f4d6c4e57eb17ac2b55f786028e996d572b98684b2805f1b6095f8314cc24cfa42b67eb1fc64fc6b3c1f3c9420399529ed537d8fb3e7cd3a6a34eb6a136d5c930b52940b5c64471e64b056928fb46b0056e83a2332dcb3549dd3a981300e61a109045361beb621de298d02f9671527795d3a0c10595c435905f14ec"]) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) r2 = socket(0x10, 0x2, 0xc) r3 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000001, 0x81}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r2, &(0x7f0000000140)="1f0000000104ff00fd435463e4af645515b81e0008000100010423dcffdf00", 0xea) dup3(r3, r2, 0x0) r4 = dup(r2) ioctl$IOC_PR_PREEMPT_ABORT(r4, 0x401870cc, &(0x7f0000000140)={0xfffffffffffffffa, 0x2, 0x0, 0x20000}) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x8000000007) getgid() pipe(&(0x7f0000000000)={0xffffffffffffffff}) setsockopt$inet6_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000080)=@ccm_128={{0x304}, "e24e2d0bfd9e6593", "0e223a5261be4811816fb192a319b75a", "551a265b", "54f9008f42eb03d4"}, 0x28) mount$fuse(0x0, 0x0, &(0x7f00000001c0)='fuse\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r6 = socket(0x10, 0x2, 0xc) r7 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r6, &(0x7f0000000140)="1f0000000104ff00fd435463e4af645515b81e0008000100010423dcffdf00", 0x1f) dup3(r7, r6, 0x0) r8 = socket(0x10, 0x2, 0xc) r9 = perf_event_open(&(0x7f0000000280)={0x2, 0x305, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x40, 0x400000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r8, &(0x7f0000000140)="1f0000000104ff00fd435463e4af645515b81e0008000100010423dcffdf00", 0x1f) dup3(r9, r8, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r8, 0x0, 0x10, &(0x7f0000000780)={{{@in=@remote, @in=@dev}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001c80)={'team0\x00'}) 03:34:00 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioperm(0x2, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) fcntl$getownex(r0, 0x10, 0x0) removexattr(0x0, 0x0) gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'hsr0\x00'}) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x400000) syz_emit_ethernet(0x36, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x15da1eb41b59a232}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 03:34:00 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f00000000c0)="240000000a0607031dfffd946fa283002035fed5200a0009000100061d04000c1baba20400", 0x25}], 0x1}, 0x0) 03:34:01 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioperm(0x2, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) fcntl$getownex(r0, 0x10, 0x0) removexattr(0x0, 0x0) gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'hsr0\x00'}) exit_group(0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x15da1eb41b59a232}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 494.284957] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. [ 494.307411] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 494.316201] protocol 88fb is buggy, dev hsr_slave_0 [ 494.316246] protocol 88fb is buggy, dev hsr_slave_1 03:34:01 executing program 0: tgkill(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100001c9, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='limits\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001e2, 0x0) [ 494.390473] protocol 88fb is buggy, dev hsr_slave_0 [ 494.396281] protocol 88fb is buggy, dev hsr_slave_1 03:34:01 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioperm(0x2, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) fcntl$getownex(r0, 0x10, 0x0) removexattr(0x0, 0x0) gettid() clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x15da1eb41b59a232}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 03:34:01 executing program 3: syz_open_dev$rtc(0x0, 0x7f, 0xce2c5de6eb4cb018) fchmod(0xffffffffffffffff, 0x36) syz_open_procfs(0x0, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x40) pipe2(&(0x7f0000000140), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) eventfd(0x101) syz_open_procfs(0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 03:34:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200800000000013, &(0x7f0000000200)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000140), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x3103101ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$netlink(r1, 0x0, 0x0) 03:34:01 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_generic(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)={0x1c, 0x19, 0xffffffffffffffff, 0x0, 0x0, {0x5}, [@typed={0x8, 0x0, @fd=r2}]}, 0x1c}}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket(0x0, 0x0, 0x0) fdatasync(0xffffffffffffffff) creat(0x0, 0x80) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) syz_genetlink_get_family_id$tipc2(0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @local}, &(0x7f0000000380)=0x1c, 0x0) fchdir(0xffffffffffffffff) r3 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x0) read$char_usb(r3, &(0x7f0000000700)=""/8, 0x8) 03:34:01 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r3, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:34:01 executing program 5: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040), 0xc, &(0x7f0000000780)={&(0x7f00000007c0)=ANY=[@ANYBLOB="b00200006c001b13282785602fd741a058b7eb42", @ANYRES32, @ANYBLOB="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"/1096], 0x2b0}, 0x1, 0x0, 0x0, 0x4000000}, 0x20004044) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) 03:34:01 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioperm(0x2, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) fcntl$getownex(r0, 0x10, 0x0) removexattr(0x0, 0x0) gettid() exit_group(0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x15da1eb41b59a232}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 03:34:01 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_generic(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)={0x1c, 0x19, 0xffffffffffffffff, 0x0, 0x0, {0x5}, [@typed={0x8, 0x0, @fd=r2}]}, 0x1c}}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket(0x0, 0x0, 0x0) fdatasync(0xffffffffffffffff) creat(0x0, 0x80) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) syz_genetlink_get_family_id$tipc2(0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @local}, &(0x7f0000000380)=0x1c, 0x0) fchdir(0xffffffffffffffff) r3 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x0) read$char_usb(r3, &(0x7f0000000700)=""/8, 0x8) 03:34:01 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0xffffffff9d81ccb8, 0x0, "50ecc909a4b7ea83eecc449f9b2a774902fda2e9c861af9a77e5d8c7fbd5e23e16c2133268f399573e8b88ce029010ad78c696674b6c00b41201fafbbb9e66362f2c5afc26ecace9e9ebb1f3849d7b8c"}, 0xd8) 03:34:01 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioperm(0x2, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) fcntl$getownex(r0, 0x10, 0x0) removexattr(0x0, 0x0) gettid() exit_group(0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x15da1eb41b59a232}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 03:34:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x1, 0x0, 0x5, 0x3, 0x0, [{0x0, 0x2, 0x24000000}]}, @enum]}}, &(0x7f0000000000)=""/236, 0x3e, 0xec, 0x1}, 0x20) 03:34:01 executing program 4: vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) rt_sigaction(0x7, &(0x7f0000000000)={0xffffffffffffffff, {}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000312ff8)) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x4, 0x44831, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='stack\x00') 03:34:01 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioperm(0x2, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) fcntl$getownex(r0, 0x10, 0x0) removexattr(0x0, 0x0) gettid() exit_group(0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x15da1eb41b59a232}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 03:34:02 executing program 3: syz_open_dev$rtc(0x0, 0x7f, 0xce2c5de6eb4cb018) fchmod(0xffffffffffffffff, 0x36) syz_open_procfs(0x0, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x40) pipe2(&(0x7f0000000140), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) eventfd(0x101) syz_open_procfs(0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 03:34:02 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x16, 0x4, &(0x7f0000000540)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x4f}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0x10171, &(0x7f0000000180)=""/251}, 0x48) 03:34:02 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioperm(0x2, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) fcntl$getownex(r0, 0x10, 0x0) removexattr(0x0, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x15da1eb41b59a232}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 03:34:02 executing program 3: syz_open_dev$rtc(0x0, 0x7f, 0xce2c5de6eb4cb018) fchmod(0xffffffffffffffff, 0x36) syz_open_procfs(0x0, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x40) pipe2(&(0x7f0000000140), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) eventfd(0x101) syz_open_procfs(0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 03:34:02 executing program 0: lsetxattr$security_smack_entry(0x0, &(0x7f0000000000)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) getsockopt$inet_buf(r0, 0x0, 0x29, &(0x7f0000000000)=""/145, &(0x7f0000000200)=0x91) 03:34:02 executing program 5: r0 = memfd_create(&(0x7f0000000440)='dev ', 0x0) fcntl$addseals(r0, 0x40a, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 03:34:02 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r3, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:34:02 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioperm(0x2, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) fcntl$getownex(r0, 0x10, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x15da1eb41b59a232}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 03:34:02 executing program 4: r0 = memfd_create(&(0x7f0000000000)='\x00', 0x0) ftruncate(r0, 0x7998) preadv(r0, &(0x7f0000000340)=[{&(0x7f0000000040)=""/38, 0xfdef}], 0x1, 0x0) 03:34:02 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, 0x0, 0x0) 03:34:02 executing program 0: r0 = memfd_create(&(0x7f0000000080)='dev ', 0x0) ioctl$FS_IOC_RESVSP(r0, 0xc01047d0, &(0x7f00000000c0)) 03:34:02 executing program 3: syz_open_dev$rtc(0x0, 0x7f, 0xce2c5de6eb4cb018) fchmod(0xffffffffffffffff, 0x36) syz_open_procfs(0x0, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x40) pipe2(&(0x7f0000000140), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) eventfd(0x101) syz_open_procfs(0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 03:34:02 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7040000000600006a0a00fe000000008500000032000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0x17d, 0x0, &(0x7f0000000400)="37eb573300001519e6a6d63d0800", 0x0, 0xffffffff00000003, 0x0, 0x0, 0xfffffffffffffd07}, 0x28) 03:34:02 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioperm(0x2, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x15da1eb41b59a232}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 03:34:02 executing program 4: clone(0x2000922100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open(0x0, 0x0, 0x0) r1 = gettid() getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40047602, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x68, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x48, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0x34, 0x2, [@IFLA_GRE_LOCAL={0x14, 0x6, @local}, @IFLA_GRE_REMOTE={0x14, 0x7, @local}, @gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}]]}}}]}, 0x68}}, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) pipe2(0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xff) getpid() 03:34:02 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioperm(0x2, 0x0, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x15da1eb41b59a232}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 03:34:02 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:02 executing program 3: syz_open_dev$rtc(0x0, 0x7f, 0xce2c5de6eb4cb018) fchmod(0xffffffffffffffff, 0x36) syz_open_procfs(0x0, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x40) pipe2(&(0x7f0000000140), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) eventfd(0x101) syz_open_procfs(0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x400000000000064, 0x0) 03:34:02 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="60074000d51f04000002000100000200dcd86c68f5f2d8c832311ec9ff0086be9084ba3404db07004821bc1e0a0113002f61f721546cf03a5b5fa1cde826b1f6e079e35593baaea913b6"], 0x4a) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) [ 496.104143] batman_adv: Cannot find parent device [ 496.143014] sg_write: data in/out 270257/32 bytes for SCSI command 0x4-- guessing data in; [ 496.143014] program syz-executor.5 not setting count and/or reply_len properly [ 496.177435] sg_write: data in/out 270257/32 bytes for SCSI command 0x4-- guessing data in; [ 496.177435] program syz-executor.5 not setting count and/or reply_len properly 03:34:03 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r3, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140), &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:34:03 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x15da1eb41b59a232}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 03:34:03 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:03 executing program 4: clone(0x2000922100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open(0x0, 0x0, 0x0) r1 = gettid() getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40047602, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x68, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x48, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0x34, 0x2, [@IFLA_GRE_LOCAL={0x14, 0x6, @local}, @IFLA_GRE_REMOTE={0x14, 0x7, @local}, @gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r4}]]}}}]}, 0x68}}, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) pipe2(0x0, 0x0) ptrace(0x10, r1) wait4(0x0, 0x0, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xff) getpid() 03:34:03 executing program 3: syz_open_dev$rtc(0x0, 0x7f, 0xce2c5de6eb4cb018) fchmod(0xffffffffffffffff, 0x36) syz_open_procfs(0x0, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x40) pipe2(&(0x7f0000000140), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) eventfd(0x101) syz_open_procfs(0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x400000000000064, 0x0) 03:34:03 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xbf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="7f454c460005e92babff3e0000fcffffffffffffff00000000f40600000000000000000000400000000000000000000000000000000000000000003800000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006346c74e484add3796509cc37f440cf2"], 0x78) ioctl$NBD_SET_FLAGS(0xffffffffffffffff, 0xab0a, 0x0) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000800)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, &(0x7f0000000840)={'syz', 0x0}, 0x0, 0x0, r1) keyctl$revoke(0x3, r1) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x66c7, 0x0, 0x6, 0x2, 0x0, 0x2, 0x1, 0x5, 0x1, 0x0, 0x6, 0x4, 0xf637, 0x1, 0x29e0, 0x6, 0x80000001, 0x10000, 0x0, 0xfffffffffffff800, 0x5, 0x1f, 0x4, 0x3, 0x5, 0x0, 0x0, 0x9, 0x5, 0x3, 0x7f, 0x6, 0x3f, 0xdd1, 0x7, 0x5, 0x0, 0x7, 0x4, @perf_config_ext={0x8000, 0x5}, 0x40, 0x1, 0x2753b56e, 0x5, 0x7, 0xfffffffffffffffc, 0x10001}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(0x0, &(0x7f0000000800)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$revoke(0x3, r2) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8000) r3 = creat(&(0x7f0000000000)='./file1\x00', 0x0) write$binfmt_elf64(r3, &(0x7f0000000040)=ANY=[@ANYBLOB="7f45000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000600000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000800"], 0x78) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8000) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f0000000200)={0xc0, 0x8, 0x1}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000280)={0x4, 0x35a17d0a, 0xff, 0x10001, 0x0, 0x1, 0x914, 0xfffffffffffff800}, &(0x7f00000002c0)) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000180)={0x1}) r4 = add_key(0x0, &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$reject(0x13, 0x0, 0x0, 0x1, r4) 03:34:03 executing program 3: syz_open_dev$rtc(0x0, 0x7f, 0xce2c5de6eb4cb018) fchmod(0xffffffffffffffff, 0x36) syz_open_procfs(0x0, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x40) pipe2(&(0x7f0000000140), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) eventfd(0x101) syz_open_procfs(0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x400000000000064, 0x0) 03:34:03 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x15da1eb41b59a232}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 496.655475] ptrace attach of "/root/syz-executor.4"[18053] was attempted by "/root/syz-executor.4"[18059] 03:34:03 executing program 4: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000000)={{{@in6=@loopback, @in=@loopback}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000000100)=0x10f) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@broadcast, @in=@multicast2}}, {{@in=@initdev}, 0x0, @in6=@remote}}, &(0x7f0000000280)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in6=@mcast2}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000400)=0xe8) getsockopt$inet6_mreq(r0, 0x29, 0x14, 0x0, &(0x7f0000000980)) getpeername$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000003780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0, 0x800) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006f80)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000006fc0)={@loopback}, &(0x7f0000007000)=0xc) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000007080)) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r1 = openat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x400, 0x4c) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000000)={{{@in6=@loopback, @in=@loopback}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="200000001000050700"/18, @ANYRES32=0x0, @ANYBLOB="6de4125af9ff000412bddd2b"], 0x3}}, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000340)}, {&(0x7f0000000440)}, {&(0x7f0000000480)="d59a2c92d18f1753dba6a2a66885bd765b92c8aba85299fc3c9273373374c4930036b0deadbfaeafbaa2c343b6937e0b65a2a1a3ca10a8c8bfbf3aec931464a2484b44ef779881ccdb48030c5727feaaa508b0b56cc85e6cab18fd364e975b85ea2a1e8173fb4c260df703f93727892bfcc65be1db8b270675664b6ecf48b079db6f8e4c667fc7ad95d4d80d599454f51acce54760b0051a1c57", 0x9a}, {&(0x7f00000006c0)}, {0x0}], 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x5402, &(0x7f0000000040)={0xffffffffffffffff, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x58fffffe, 0x3}) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000100)) r6 = syz_open_pts(r5, 0x88d82) write(r6, &(0x7f0000000380)="e313ed3d4b4aea617c1c4122a833ce3ce4877c10995c0738ea7a2a007085692e9defa90aeb7cabf14ae79b84e2a925ba7f6352bd25a90e1529d3f57edbe9eab01acf24", 0xa2ff821e) [ 496.716471] batman_adv: Cannot find parent device 03:34:03 executing program 3: syz_open_dev$rtc(0x0, 0x7f, 0xce2c5de6eb4cb018) fchmod(0xffffffffffffffff, 0x36) syz_open_procfs(0x0, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x40) pipe2(&(0x7f0000000140), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) eventfd(0x101) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 03:34:03 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x15da1eb41b59a232}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 03:34:03 executing program 5: ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) creat(0x0, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) close(0xffffffffffffffff) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, 0x0, &(0x7f00000001c0)) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) fremovexattr(r0, &(0x7f0000000000)=@known='security.apparmor\x00') clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(0x0) syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) readahead(0xffffffffffffffff, 0x1, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, 0x0, 0x20020002) 03:34:03 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000027c0)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3f7fffffff2f73451c0e17a606fe530cb7e18ad181867514fe60077d4dd90123d27e7cf43548ce85857ad4a77cb56e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48253f8dbe82e16cf0000000000000000000000000000790ae2fd45d54b107c8c247f195e32f17799d6707432ff48bc085763314166443ee72c74f3db890e1ff15a10d91f67e9a22a986e0e244bd117252e47ffda1a869db7e632df4de8572344b419c45c2170fe873692d8255170c16822bdffd313660489c4c953a548ea5480dae93c7e4920a050f7c4cad3d9e75762e06f2954a18bd8464853b36a696e6ee7f2a12b53ecc0a0d4abcb93afea2d32d086635cd6e8da81db762e3446128da56e49b095a052811a0aac9f7c8b4afd65e9351ca78586e9681379f1ede100000000001986978e87a7e61f65163cf8fbfc1ed498c583751798a90dd7be57d0a09478983a2cb5df5e33789054354c6375f343ab6e8838ff3d6e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:03 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r3, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140), &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:34:03 executing program 4: setuid(0xee01) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) rt_sigqueueinfo(r1, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffff9}) 03:34:03 executing program 5: ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) creat(0x0, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) close(0xffffffffffffffff) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, 0x0, &(0x7f00000001c0)) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) fremovexattr(r0, &(0x7f0000000000)=@known='security.apparmor\x00') clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(0x0) syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x0) readahead(0xffffffffffffffff, 0x1, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, 0x0, 0x20020002) 03:34:03 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x15da1eb41b59a232}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 03:34:03 executing program 3: syz_open_dev$rtc(0x0, 0x7f, 0xce2c5de6eb4cb018) fchmod(0xffffffffffffffff, 0x36) syz_open_procfs(0x0, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x40) pipe2(&(0x7f0000000140), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 03:34:04 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x15da1eb41b59a232}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 03:34:04 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0x3, &(0x7f00000001c0)=""/181, &(0x7f0000000140)=0xb5) 03:34:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x80000000b9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x400000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x407412ec, &(0x7f0000000180)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000a0, 0x8]}) openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vga_arbiter\x00', 0x1, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x0, 0x40041) syz_open_procfs(0x0, 0x0) rmdir(0x0) 03:34:04 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x15da1eb41b59a232}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 03:34:04 executing program 4: sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240), 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000340)=ANY=[@ANYBLOB='\x00'/16]) dup(0xffffffffffffffff) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000100)={0x18}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x10008002) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000080)={0x0, 0x0, 0x8}) write(r0, &(0x7f0000000140)="b63db85e1e8d020000000000003ef0011dcc606aed69d2", 0x17) r1 = syz_open_dev$sg(0x0, 0x0, 0x10008002) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000080)={0x0, 0x0, 0x8}) 03:34:04 executing program 2: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x15da1eb41b59a232}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 03:34:04 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:04 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r3, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140), &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:34:04 executing program 4: stat(0x0, 0x0) getgroups(0x0, 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = getpgid(0x0) r2 = getegid() sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000040)=@proc={0x10, 0x0, 0x25dfdbfe, 0x4053fb265b44b268}, 0xc, &(0x7f0000000400)=[{&(0x7f00000026c0)={0x4c, 0x0, 0x0, 0x70bd29, 0x25dfdbfb, "", [@nested={0x4, 0x5e, [@generic]}, @generic="4d55654ef3a9e161333289f71cf7b51a56a546b6a09cb88528dab114a32a9890210994d074d8fb5ee357d7892a1ed960eed3df80e5"]}, 0x4c}, {&(0x7f0000008740)=ANY=[@ANYBLOB], 0x1}, {&(0x7f00000074c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="040000000c00000003000000000000002ca85d7e6d24335b74477e0fa8c20800992e5c07013ea6ff9fe91bd5260318cf9c84b3043208a28e4bb68561eefb52fc32b92484db62ac025bf4147d97b5837c5601a2e306e2f532c4181f7b5c4944a49a52c451a6ab1838557839d8259c012f78d4b8663d25e05f8046c7bf7809ef5b5eeb39372344d0cf2441bad11016972f0476e9d2c1ea53132827782143def61c6fc7ed401e1ad589b48acaed663d1fe93bd7d1f16d3f83116f21d6e9fc144e339c5894187009dad16c20bccf21c11d34413829ab0eee3021c92b69c12587dbb4f6bc017b1c468cf92a67a3db10e0c37e1b4438e9cf8460dba8db7b3ffc5c5dfae6d4a8d76a07397d98a662921bd33a21bebc761ce2b84f89f4684e927cfcb1317fda162a4853dd05dc19442605165516bc0eac659a1e3616ca491bcb76d6dd9aea8bdf0c22dd3ab9720e3c00b274fabcbd8203dde6c8b69e5513f0a0424afb20da560e0760c2368ffbc33d822c63b2abfce152436d0b4b7c1f5a239684f6216e96fb1786374e81e9b6bbb9e3cdf0ed1daa6855590467df8727e54f7cf718acffe50076e8ac6d7ea853ea0ed9ba34dc68bd71cf96c8b70384d2842e1bf6a87a4024dd44eaf6560471434994a4472b566fba28e6d2de02fb0d5bff8776fce7d5652a9ed56da7cdc8001f0e2e2d06f9253888be4fd8a759328d28baa71a70d63386539adce6e0e198efaa76831f48feb5c17415159383b8a03dd488b800dc019322ab0399d03e5d8903fa2f4149918d13cc212f606d44a2361ceb26f929315535a7c543b594fe46f5172e96dfd7d97dcfd827540541ca1bc04aa379f6481cd732767d651d321a26bfb2b16637fbd5250228c837d57b2c931daad779d2e64534644bd959e85481130aea663a2f4a999cc5bef24aff4a8fd9ddcc9f3c1ca8de20ec1fd7cfed31bbb0693b7b3c63e7327b95030187e47ccba29f43c172666a22fed876bb82c27542e0ef58fd0b5d54b8f7d7f314dc448210d7b584b70b090cad3687b45bf3600a17afd2204f15d1978d9317d9dc13719757fae1f1279730720bfd1694ff75ff6df27ce3e618f3a70d588fc06f5e258b4a2564f2081181607f3496325219092d859d5e890c5e9057d9c1f935d45ad4aea7be6f7e522f63f067d06c41098922ab7db3d09b61838e02090af5d351ebfd2c84195f219ef2aad6db343777b6add02b6f49049859f0050c111b56f9f033f48100ea6ab0b31b00f8b3f886578203df621dcf0998fac41ba0d8fc9a4b215986bf8372b82ad5338106a6217637b04ad2562227c9934fdadc3cce1dd9dcaaa2daacd3f9724ebf4e6cdca5312e9b6f590f8f443e01329a06fef593cdd4a9d5570dc52f818e5d0fb221a1e14ada666eef2c637bd091c16c3f71efd6fc9b53311db14c6471f636fa069f91c9af3993fcd952fc1e04d6a334db3671eaa6e866d406ce0cc725f501b56b460f9db6d2cfe54da21082a029d53651a526a7ab8a05ec7affdc0b88996ce40ce50754c1975f60733042567587709d615d91f761f5a5cac8d8fb52d7e55dc41b2ba972e03d7c27ebc7e40d66b24ecc1576c91fdae9f8eccbc264af27ea426de1a806e813af79a5f4ccc4c05d746daae25d4989400b5378b2644ca6bf06258421bd45d22d324210650f1bbec968cf586c1359df24f04e5f044f14203de81337c9d02459a64f4f5a0fbf0dc7fab82400258668b1cb345664a72f8bbbd85cac0914d9e53ac83220832e406247438c78c349e26b3b7e109859b8ee76f255ae5d60a85b1acef6e9ba2a000ae20814da32b2366986c344443c9484becec7c0a41964a742a094e87f5f2156c8444fa7154efec1c89ac7958dc6e3c19124205956ad8c425ab1d4dd323f61dfdb09f3bb5ab9bbf9dd7d94e7d9703b73e5c79a515678983591cf9cf5778aa440c746edcfbacc75b8c2380101a1acda4c7712097159ba5f4e75f6feb50c3b11f5f948010db1f7a0fe3982c8e24984d37aa3748330dcc69d0ed3c419f68214dc9b5ee1ff765b67a91323c74fc701832d0e9293341deb07c20243ef8d169ba6fc2f30be5e25d641043dd5e240afa03f824f91bff831aa6c40001e39603822b65943094d5ac571567025b4b1e2d513537a0aedc4d5ff6e61ac454f898cb1b6c0e32c0e119ebce9fe383de52a37a7d3935d05addedc7a639a801e130eb7f2dfb496a413030cc9f23e20639dd56d699254b62f1cf8c5dd0524012063aae5a1fcfcb50f250df5b21ac2edfe3131ae6f31645c122b3f7aeaf154bf5a8ba72ccd7bd64a8e7003cc71f48b54cea77b76855b4c90734c8f6ce3d17037bcc760eed4d086f97d5cf9b23347900c04741da188bbf8b611d105d09a79950385058d445f41a9f704bcf9e90aa17a28fa9fcb250f9c4ddcb596b1b8e5d41f82d4bc95a88c43286ff5f39ff9e76cb81c39cc62c9770e8871bf93dfe648674422ad43bef5ef2845344f13521d6c9f554f9d4aa87a6c8b9a69be90af0d61eaf5772e6a86df141723b88925ab8d3dcfc7cdc09e2ead7d0015c532412f4e86d020c708613ed187f72da31c1274d8959f63c00687c5daec48445bc52fcedb6875fc53f948d89d9f891683f791633c5256c86de38b9e29f63a56b4a4861862a4107b6b49180027982a5b6567f43454551ca38b29e04feb7109105a085c37c4708a5833966e3b64f6e47da258b79b368131d03100578ff67c9ab4488ba27d5309e1d3d267b649fbd4c81cd8911ac5c02b53348fe10399751ed07d1dddcc574a40833ab0b9ca3cc09d99408da4fb838072b149d7450dbe9649391e74e607fd1153a1cc07922fca17d5b2207d6b0794ed973f07425c300ca13e73fcc0d7c39783f9333c642361639ffd806735c79f8f2668c894099bf6ba4ee09845324a1c5ac9794592c910af2c454923fc44f5f19f5425c7d55d9deba1ed71c77a7c35dc0aa58302df64de40e8fdfca2a28764138a934cbfe62107ab2aadb0f3032070bb6663aab3020ebd6c1850dfb61d82c2b524d54ca248b8507450a7fa2c87611245d1aeb7f09dc29e379841cb269fb46d0b6901b7afabbbd06bdca4f74a9bacbf517d783ba632f095ab3c30f27850c36d98972f6eccced2049865b82c39242e03d195afb17f138f1b892f66f1f41a0b8de198c83ecbd709573541c11ce92ab4d933686652e3e9069ea6fc9267d0339bd1e0ba3058e3add17cafd053d2ce69314f70d72e662d438d47ea756be3e86b007cd0ada124745b3703ee87733b4a5d1dcc785775fa874b69c6309f469209083b25ea1641353161cb967279a354d195bbd7d5d7e7bb69ea83a15ce19116b7fbc99087fa7645d9517cae87bb5489970b60171420ec7e4236158c8e8b3fc5d4ab8c451c49a4327181c3adeb1a9550f47c50c4f104aaa56d6a511a8e45d79f28cfa373871e674d1bb0a4496311848a0f8165e43ce7d177b302a403a8097c2d0dcd923e238dcfcf0413167b34d5326b492cf44a86fb3c3fea3718ea04c0fde2889e8c233825ebcb550a3c706b74a170014e2367c5a5095396fe6e77929937a5998c836c756ae9982214ea5d2d9c782d1b18bf3d4f33c4122cb51487c5aaa51befa6fb4c143002829bbc2590e15f933c600548cdd41bed245e24140240af250c7cd702194ff9ca27445e917684c7e880b07def4323fc69e30138f4fa618a4e56744e00c36bc26e27c3ab46b3adfd20041277d28d270af4a9813d75de1226b9d5f0cdd300a73a88b4134bd20c46dc6bd80a07f6a9a0e6c2e9c43b9172d93163b94d39724163452a717bca083cbc7cb69e19a505807e2da1692d7f8fe531610e272d97e6786fd034915dd509502e55b96f302d3e4ea4863883d212d0839484b5e989ccefaa6e5b47df88a2878c3aacba2969e9b1d1f5e6dddb6818a97408ad40c710b6bc2fd1c65db8fe52ceda5436918240464bd4eaeea68fcb13aa969a5e8ef07edf8557d57ea190e1febaadec7dd7df401daacce2c4e282962bd8aec0485187576c922a669c59b8fc677b4a4301cc0e3630b13581b64bad104afd3772172eb9b44c4fcffd53554c90d2b5a4cbb55c1dc0a69e709b9a299b6b50f3312919e0087013f4a33ac92f6804b8406466856104320e994b581c3410007c1202ab8d6f74e0462de0bfe11bf44b8fd204eb7d85344e091047184a01935bfe6c651d4d936e9ae3358c7af4727bbba92d16a086eaa5338eaefa985b4e76c7736198db6e1b8e1bbd735b9849b8aa0495bfbc9d29d5aa66d990e1af1800b449d9bd16d1124be3f90d5c38ef5c34f88c0d620c868d384f49759af816a23d11baa35677e3d0649e50d3846f62b9bdaaa3e28fde6ccdcad81d72290c5311be8bc7f9e9bf6dea605f7dcd41e2f2ce8f378dd29b432362b852d67ad457d06feff0b76bdf0ee47aa7659bb99d269f6b4f6ec2fba82bd3eb454ad1738a9e03c2668102a55a7a4f71d14cc3bbf2b3a19d1dc55890e1d491bc55410db9e1c8be27ee8e8c19bb81148b91dedc3427e8442343796e91f297ca930d1ff2d08950dc29c41d2d3f8a338e3ad4f9834fcc7c0a8772c43fa2b219633e52a5e56d705d976e9ef3b830883f3d5a5bdb72068e5635211061c29a7fa77447462695116613415b327ce5960799ee00e223e3d81af327d98a7b7f5216799388b16588fe8eda6691c561771bf2946e94b465e730ee0ac84a339be6c4f385cd9d4094cb"], 0x2}], 0x3, &(0x7f00000007c0)=[@cred={{0x18, 0x1, 0x2, {r1, 0x0, r2}}}, @cred={{0x18}}], 0x30}, 0x0) setregid(r2, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x200000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) creat(0x0, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = socket(0x0, 0x800000000080003, 0x0) sendmmsg$alg(r5, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(&(0x7f0000000500)='./file0\x00', 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x8) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x400854d5, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) r6 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_genetlink_get_family_id$SEG6(0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$KVM_GET_LAPIC(r6, 0x4400ae8f, &(0x7f00000004c0)={"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"}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) setgroups(0x0, 0x0) 03:34:04 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x15da1eb41b59a232}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 03:34:04 executing program 5: socket(0x11, 0x80b, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync() 03:34:04 executing program 5: clone(0x210a093ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:34:04 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x15da1eb41b59a232}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 03:34:04 executing program 3: syz_open_dev$rtc(0x0, 0x7f, 0xce2c5de6eb4cb018) fchmod(0xffffffffffffffff, 0x36) syz_open_procfs(0x0, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x40) pipe2(&(0x7f0000000140), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 03:34:04 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:04 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x15da1eb41b59a232}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 03:34:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vat\x00\xafh\x04\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) r1 = socket(0x10, 0x3, 0x0) recvmsg(r1, &(0x7f00000023c0)={0x0, 0x0, 0x0}, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040)={0x1}, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000240)={0x0, 0xffffffffffffff4a, &(0x7f0000000200)={&(0x7f0000000080)={0x18, 0x16, 0xa01}, 0x18}}, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) 03:34:04 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x800100000003) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000a83000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 03:34:04 executing program 2: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x0, 0x0, 0x0) [ 498.470206] net_ratelimit: 16 callbacks suppressed [ 498.470212] protocol 88fb is buggy, dev hsr_slave_0 [ 498.481166] protocol 88fb is buggy, dev hsr_slave_1 [ 498.550291] protocol 88fb is buggy, dev hsr_slave_0 [ 498.555620] protocol 88fb is buggy, dev hsr_slave_1 03:34:05 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r3, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:34:05 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:05 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0x4010ae42, &(0x7f0000000040)) 03:34:05 executing program 2: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 03:34:05 executing program 3: syz_open_dev$rtc(0x0, 0x7f, 0xce2c5de6eb4cb018) fchmod(0xffffffffffffffff, 0x36) syz_open_procfs(0x0, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x40) pipe2(&(0x7f0000000140), 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 03:34:05 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) flock(r0, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000000)=0x7) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000680)=0x65ed, 0x4) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) stat(0x0, &(0x7f0000001280)) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f00000006c0)=0x9) syz_open_dev$vcsa(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001300), &(0x7f0000001480)=0xffffffcc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREAD(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000, 0x3, &(0x7f0000001200)=[{&(0x7f0000000100)="ecb542c8a0d3", 0x6}, {0x0}, {0x0}], 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) write$FUSE_ENTRY(r1, &(0x7f0000000380)={0x90}, 0x90) r2 = open$dir(&(0x7f0000000740)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000700)='./file0\x00', 0x90002) sendfile(r1, r2, 0x0, 0x7ffffff0) sendfile(r2, r2, &(0x7f0000000140)=0x8800, 0x8800000) 03:34:05 executing program 2: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x0, 0x0, 0x0) [ 498.689834] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 03:34:05 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000140)=@filename='./file0\x00', 0x0, 0x0, 0x23080, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x207}) getuid() open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) getresgid(&(0x7f00000055c0), 0x0, 0x0) getgroups(0x7, &(0x7f0000000080)=[0xee01, 0xffffffffffffffff, 0xee01, 0xffffffffffffffff, 0xee00, 0xee01, 0x0]) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) wait4(0x0, 0x0, 0x0, 0x0) getpid() request_key(0x0, &(0x7f0000001700)={'syz', 0x2}, &(0x7f0000001740)='wlan1[.\x8c\x00', 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000002380)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0xffffff88, 0x0, @remote={0xac, 0x70}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x4, 0x0, 0x0, 0x0, 0x2, {0x5, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev={0xac, 0x14, 0x14, 0x2}}}}}}}, 0x0) 03:34:05 executing program 2: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@broadcast, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 03:34:05 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) [ 498.718807] audit: type=1804 audit(2000000045.410:218): pid=18210 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.5" name="/root/syzkaller-testdir039520882/syzkaller.cW7i97/396/file0" dev="sda1" ino=16786 res=1 03:34:05 executing program 3: syz_open_dev$rtc(0x0, 0x7f, 0xce2c5de6eb4cb018) fchmod(0xffffffffffffffff, 0x36) syz_open_procfs(0x0, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x40) pipe2(&(0x7f0000000140), 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) [ 498.789399] audit: type=1804 audit(2000000045.450:219): pid=18210 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.5" name="/root/syzkaller-testdir039520882/syzkaller.cW7i97/396/file0" dev="sda1" ino=16786 res=1 03:34:05 executing program 2: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@broadcast, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 499.023852] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 03:34:06 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r3, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:34:06 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000140)=@filename='./file0\x00', 0x0, 0x0, 0x23080, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x207}) getuid() open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) getresgid(&(0x7f00000055c0), 0x0, 0x0) getgroups(0x7, &(0x7f0000000080)=[0xee01, 0xffffffffffffffff, 0xee01, 0xffffffffffffffff, 0xee00, 0xee01, 0x0]) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) wait4(0x0, 0x0, 0x0, 0x0) getpid() request_key(0x0, &(0x7f0000001700)={'syz', 0x2}, &(0x7f0000001740)='wlan1[.\x8c\x00', 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000002380)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0xffffff88, 0x0, @remote={0xac, 0x70}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x4, 0x0, 0x0, 0x0, 0x2, {0x5, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev={0xac, 0x14, 0x14, 0x2}}}}}}}, 0x0) 03:34:06 executing program 2: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@broadcast, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 03:34:06 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) flock(r0, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000000)=0x7) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000680)=0x65ed, 0x4) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) stat(0x0, &(0x7f0000001280)) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f00000006c0)=0x9) syz_open_dev$vcsa(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001300), &(0x7f0000001480)=0xffffffcc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREAD(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000, 0x3, &(0x7f0000001200)=[{&(0x7f0000000100)="ecb542c8a0d3", 0x6}, {0x0}, {0x0}], 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) write$FUSE_ENTRY(r1, &(0x7f0000000380)={0x90}, 0x90) r2 = open$dir(&(0x7f0000000740)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000700)='./file0\x00', 0x90002) sendfile(r1, r2, 0x0, 0x7ffffff0) sendfile(r2, r2, &(0x7f0000000140)=0x8800, 0x8800000) 03:34:06 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:06 executing program 3: syz_open_dev$rtc(0x0, 0x7f, 0xce2c5de6eb4cb018) fchmod(0xffffffffffffffff, 0x36) syz_open_procfs(0x0, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x40) pipe2(&(0x7f0000000140), 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 03:34:06 executing program 2: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@broadcast, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 499.520151] protocol 88fb is buggy, dev hsr_slave_0 [ 499.525313] protocol 88fb is buggy, dev hsr_slave_1 [ 499.530478] protocol 88fb is buggy, dev hsr_slave_0 [ 499.535556] protocol 88fb is buggy, dev hsr_slave_1 03:34:06 executing program 2: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)={@broadcast, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 499.623618] audit: type=1804 audit(2000000046.320:220): pid=18264 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.5" name="/root/syzkaller-testdir039520882/syzkaller.cW7i97/397/file0" dev="sda1" ino=16915 res=1 [ 499.660985] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 03:34:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={0xffffffffffffffff, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:06 executing program 3: syz_open_dev$rtc(0x0, 0x7f, 0xce2c5de6eb4cb018) fchmod(0xffffffffffffffff, 0x36) syz_open_procfs(0x0, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x40) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 03:34:06 executing program 4: pipe(&(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) r3 = socket$packet(0x11, 0x2000100000000a, 0x300) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000040)=[{0xb1, 0x0, 0x0, 0xfffffffffffffffe}, {0x80000006}]}, 0x10) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r5, 0x407, 0x0) write$binfmt_misc(r5, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r6, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r6, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r4, 0x0, r6, 0x0, 0x30005, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, 0xfffffffffffffffe, 0x4080) openat$usbmon(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 499.739344] audit: type=1804 audit(2000000046.360:221): pid=18264 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.5" name="/root/syzkaller-testdir039520882/syzkaller.cW7i97/397/file0" dev="sda1" ino=16915 res=1 03:34:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={0xffffffffffffffff, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) [ 499.830122] protocol 88fb is buggy, dev hsr_slave_0 [ 499.835274] protocol 88fb is buggy, dev hsr_slave_1 03:34:06 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r2, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/156) 03:34:06 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r3, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:34:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={0xffffffffffffffff, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:06 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(0x0, 0x0) r4 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCG_STATS(r4, 0x9208, 0x0) fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000001380)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0xff], 0x1f004}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001140)=0x0) process_vm_readv(r6, &(0x7f0000001280)=[{&(0x7f0000001180)=""/64, 0x40}, {0x0}, {&(0x7f0000001200)=""/88, 0x58}], 0x3, &(0x7f0000001340)=[{&(0x7f00000012c0)=""/128, 0x80}], 0x1, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_NMI(r5, 0xae9a) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@loopback, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@local}}, &(0x7f0000000080)=0xe8) getgroups(0x0, 0x0) socket$packet(0x11, 0x2, 0x300) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f0000000400)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa708]}) write$binfmt_aout(r1, &(0x7f0000000700)={{0x0, 0x8000, 0x2c6, 0x1aa, 0x0, 0xff, 0x388, 0xf92b}, "f57c1a25a0dee25c25ee37e025009cbfa65f3a4925f9280a409bb1020ce6990107a5919597383ac8f6d0da42e877b618176ee160c2e2f0399d81bf1a8fe7b1dae20b293da86b2cd468682cfe15bf3e0f93e329d495027bc95fc27547f94789a2637d433d690b62d29101f636f22c206018fdb1eac5afe8171544a0d2a38aa08fde0218042816d91a8cb68238697843e6e88e20e91953fc8cb79b92382bba2d7b6d0590e3287f146a004034c9f778588785630561a1d5ee876fe6c02c21db3982cccf461ba1a19d948b6cba9fc8756ef9ee61f3d0f8174424fd53c9c17d88e6c708", [[], [], [], [], [], [], [], [], []]}, 0xa01) ioctl$KVM_RUN(r5, 0xae80, 0x900000000000000) open(&(0x7f0000000000)='./file0\x00', 0x284240, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x280000, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x4440, 0x0) ioctl$SG_NEXT_CMD_LEN(r7, 0x2283, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x0, 0x2, 0x4, 0x8, 0x0, 0x3f, 0x0, 0x395, 0x40, 0x40, 0x7fff, 0x0, 0x38, 0x2, 0x4, 0xf627, 0x7f}, [{0x70000000, 0x0, 0x0, 0x93b, 0x6, 0x25823d0, 0x1000, 0x5}, {0x3, 0x9, 0x8, 0x6, 0x0, 0x7f, 0x0, 0x1}], "388a0833746e1c467069e4f0e995437d24374b19165e7369a7b3c182ecfc448461d0adb0f428442015fd85acc5068f9920f6002d86a110b255e6b76e649984", [[], [], []]}, 0x3ef) 03:34:06 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) flock(r0, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000000)=0x7) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000680)=0x65ed, 0x4) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) stat(0x0, &(0x7f0000001280)) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f00000006c0)=0x9) syz_open_dev$vcsa(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001300), &(0x7f0000001480)=0xffffffcc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREAD(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000, 0x3, &(0x7f0000001200)=[{&(0x7f0000000100)="ecb542c8a0d3", 0x6}, {0x0}, {0x0}], 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) write$FUSE_ENTRY(r1, &(0x7f0000000380)={0x90}, 0x90) r2 = open$dir(&(0x7f0000000740)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000700)='./file0\x00', 0x90002) sendfile(r1, r2, 0x0, 0x7ffffff0) sendfile(r2, r2, &(0x7f0000000140)=0x8800, 0x8800000) 03:34:06 executing program 0: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:07 executing program 0: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) [ 500.296477] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 500.306503] audit: type=1804 audit(2000000047.000:222): pid=18310 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.5" name="/root/syzkaller-testdir039520882/syzkaller.cW7i97/398/file0" dev="sda1" ino=16915 res=1 [ 500.377193] audit: type=1804 audit(2000000047.040:223): pid=18310 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.5" name="/root/syzkaller-testdir039520882/syzkaller.cW7i97/398/file0" dev="sda1" ino=16915 res=1 03:34:07 executing program 0: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:07 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f00000027c0)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3f7fffffff2f73451c0e17a606fe530cb7e18ad181867514fe60077d4dd90123d27e7cf43548ce85857ad4a77cb56e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48253f8dbe82e16cf0000000000000000000000000000790ae2fd45d54b107c8c247f195e32f17799d6707432ff48bc085763314166443ee72c74f3db890e1ff15a10d91f67e9a22a986e0e244bd117252e47ffda1a869db7e632df4de8572344b419c45c2170fe873692d8255170c16822bdffd313660489c4c953a548ea5480dae93c7e4920a050f7c4cad3d9e75762e06f2954a18bd8464853b36a696e6ee7f2a12b53ecc0a0d4abcb93afea2d32d086635cd6e8da81db762e3446128da56e49b095a052811a0aac9f7c8b4afd65e9351ca78586e9681379f1ede100000000001986978e87a7e61f65163cf8fbfc1ed498c583751798a90dd7be57d0a09478983a2cb5df5e33789054354c6375f343ab6e8838ff3d6e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:07 executing program 3: syz_open_dev$rtc(0x0, 0x7f, 0xce2c5de6eb4cb018) fchmod(0xffffffffffffffff, 0x36) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 03:34:07 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xb, 0x3, &(0x7f0000000280)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x21, 0x54}}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfc76, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)}, 0x48) 03:34:07 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(0x0, 0x0) r4 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCG_STATS(r4, 0x9208, 0x0) fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000001380)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0xff], 0x1f004}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001140)=0x0) process_vm_readv(r6, &(0x7f0000001280)=[{&(0x7f0000001180)=""/64, 0x40}, {0x0}, {&(0x7f0000001200)=""/88, 0x58}], 0x3, &(0x7f0000001340)=[{&(0x7f00000012c0)=""/128, 0x80}], 0x1, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_NMI(r5, 0xae9a) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@loopback, @in=@multicast1}}, {{@in6=@initdev}, 0x0, @in=@local}}, &(0x7f0000000080)=0xe8) getgroups(0x0, 0x0) socket$packet(0x11, 0x2, 0x300) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f0000000400)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa708]}) write$binfmt_aout(r1, &(0x7f0000000700)={{0x0, 0x8000, 0x2c6, 0x1aa, 0x0, 0xff, 0x388, 0xf92b}, "f57c1a25a0dee25c25ee37e025009cbfa65f3a4925f9280a409bb1020ce6990107a5919597383ac8f6d0da42e877b618176ee160c2e2f0399d81bf1a8fe7b1dae20b293da86b2cd468682cfe15bf3e0f93e329d495027bc95fc27547f94789a2637d433d690b62d29101f636f22c206018fdb1eac5afe8171544a0d2a38aa08fde0218042816d91a8cb68238697843e6e88e20e91953fc8cb79b92382bba2d7b6d0590e3287f146a004034c9f778588785630561a1d5ee876fe6c02c21db3982cccf461ba1a19d948b6cba9fc8756ef9ee61f3d0f8174424fd53c9c17d88e6c708", [[], [], [], [], [], [], [], [], []]}, 0xa01) ioctl$KVM_RUN(r5, 0xae80, 0x900000000000000) open(&(0x7f0000000000)='./file0\x00', 0x284240, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x280000, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x4440, 0x0) ioctl$SG_NEXT_CMD_LEN(r7, 0x2283, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x0, 0x2, 0x4, 0x8, 0x0, 0x3f, 0x0, 0x395, 0x40, 0x40, 0x7fff, 0x0, 0x38, 0x2, 0x4, 0xf627, 0x7f}, [{0x70000000, 0x0, 0x0, 0x93b, 0x6, 0x25823d0, 0x1000, 0x5}, {0x3, 0x9, 0x8, 0x6, 0x0, 0x7f, 0x0, 0x1}], "388a0833746e1c467069e4f0e995437d24374b19165e7369a7b3c182ecfc448461d0adb0f428442015fd85acc5068f9920f6002d86a110b255e6b76e649984", [[], [], []]}, 0x3ef) 03:34:07 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:07 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r3, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, 0x0}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:34:07 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x3, 0x0, &(0x7f0000000280)) 03:34:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000300)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xffffffffffffff02, 0x420ffe0, 0x0, 0xfffffffffffffd37) 03:34:07 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:07 executing program 3: syz_open_dev$rtc(0x0, 0x7f, 0xce2c5de6eb4cb018) fchmod(0xffffffffffffffff, 0x36) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 03:34:07 executing program 2: timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = getpid() timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) ioctl$MON_IOCG_STATS(r0, 0x400c9206, &(0x7f00000018c0)) ioctl$MON_IOCG_STATS(r0, 0x9208, &(0x7f0000000040)) tkill(r1, 0x800000015) 03:34:07 executing program 5: syz_emit_ethernet(0x5e, &(0x7f0000000500)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x28, 0xffffff88, 0x0, @remote={0xfe, 0x80, [0x29c, 0x58, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@ndisc_redir={0x89, 0x0, 0x0, [0x0, 0x0, 0x0, 0xf0ffff], @mcast2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}}}}, 0x0) 03:34:07 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:07 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000300)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xffffffffffffff02, 0x420ffe0, 0x0, 0xfffffffffffffd37) 03:34:07 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = getpid() tkill(r1, 0x9) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r2, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) mq_open(0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$KDGETKEYCODE(r3, 0x400812fa, &(0x7f0000000100)) open_by_handle_at(r3, &(0x7f0000000180)={0x31, 0x3711, "d3634cd0215a51adae440119f984be4048ef21200dc400594f42477da926a3bf538b1b5c344b013d27"}, 0x240) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f00000002c0)={'U-', 0xa5a}, 0x28, 0x0) 03:34:07 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:08 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r3, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, 0x0}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:34:08 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:08 executing program 5: getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x50, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 03:34:08 executing program 4: r0 = socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet(r0, &(0x7f0000005600)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000ac0)=[@ip_pktinfo={{0x18, 0x0, 0x8, {0x0, @remote, @local}}}, @ip_retopts={{0x14, 0x0, 0x7, {[@ra={0x94, 0x6}]}}}], 0x2c}}], 0x1, 0x0) 03:34:08 executing program 3: syz_open_dev$rtc(0x0, 0x7f, 0xce2c5de6eb4cb018) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 03:34:08 executing program 4: pipe2(0x0, 0xffe21e66ec54393b) ioctl$KVM_SET_NESTED_STATE(0xffffffffffffffff, 0x4080aebf, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20000000000000, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0xcc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cuse\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r2 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x24000000) r3 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000100)='NET_DM\x00') ioctl$LOOP_CLR_FD(r1, 0x4c01) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x2000, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3a8, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x5, 0x0, 0x8001, 0x9, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x3c) r4 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x4, 0x10000) ioctl$MON_IOCX_MFETCH(r4, 0xc00c9207, &(0x7f00000000c0)={&(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3, 0xffff}) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="1300000065ff822e00001c0600395032"], 0x10) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) splice(r5, 0x0, r6, 0x0, 0x200, 0x0) pipe(0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x200, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000440)=ANY=[@ANYPTR=&(0x7f0000001680)=ANY=[@ANYRES32=r3, @ANYBLOB="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", @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRES16=r5], @ANYRESOCT=r0, @ANYPTR, @ANYPTR64=&(0x7f0000000380)=ANY=[]], @ANYRES16, @ANYRES64, @ANYRES32, @ANYRESDEC]) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, &(0x7f0000000640)=ANY=[@ANYBLOB="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"]) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) 03:34:08 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000027c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:08 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000027c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:08 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:08 executing program 4: memfd_create(&(0x7f0000000780)='\x00', 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xd5d6, 0x141002) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x68, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x48, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0x3, 0x2, [@IFLA_GRE_LOCAL={0x14, 0x6, @local}, @IFLA_GRE_REMOTE={0x14, 0x7, @ipv4={[], [], @multicast2}}, @gre_common_policy=[@IFLA_GRE_LINK={0x8}]]}}}]}, 0x68}}, 0x0) 03:34:08 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r3, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, 0x0}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:34:08 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000027c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:08 executing program 3: syz_open_dev$rtc(0x0, 0x7f, 0xce2c5de6eb4cb018) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 03:34:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000800)='./file0\x00', 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1300000036ffff018000000600395032303030"], 0x13) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000000)={0x18}, 0x18) write$FUSE_ENTRY(r2, &(0x7f0000000140)={0x90}, 0x90) write$FUSE_DIRENT(r2, &(0x7f0000000500)={0x10}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x211) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = open$dir(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) getdents64(r3, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:34:08 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000027c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:08 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="000000001e4c00006ba158a30367c154abe919e65e"], 0x1}}, 0x0) clock_gettime(0x3, &(0x7f0000000300)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r5) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) [ 502.055428] nla_parse: 3 callbacks suppressed [ 502.055434] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.4'. 03:34:08 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000027c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:08 executing program 3: syz_open_dev$rtc(0x0, 0x7f, 0xce2c5de6eb4cb018) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 03:34:08 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000027c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:09 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000001c0), 0xfffffef3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r2, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:34:09 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:09 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6af3b660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0xfffffffffffffffb}], 0x1, 0x0, 0x0, 0xfffffffffffffdd8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) lsetxattr$security_ima(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='security.ima\x00', &(0x7f0000000540)=@md5={0x1, "07dd46d1d65dabf1ffe644f1e447f8e8"}, 0x11, 0x1) prctl$PR_SET_PDEATHSIG(0x1, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000001c0)={[0xd2d, 0x0, 0x0, 0x0, 0xff, 0x0, 0x200]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2b2) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$EBT_SO_GET_INIT_ENTRIES(r3, 0x0, 0x83, &(0x7f00000003c0)={'nat\x00', 0x0, 0x4, 0xff, [], 0x0, &(0x7f0000000100), &(0x7f00000005c0)=""/255}, &(0x7f0000000340)=0x50) ioctl$KVM_S390_UCAS_UNMAP(0xffffffffffffffff, 0x4018ae51, &(0x7f0000000000)={0x0, 0x0, 0x6}) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'NETMAP\x00'}, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae68, &(0x7f0000000000)={0x4000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:34:09 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) listen(0xffffffffffffffff, 0x1f) bind$unix(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000002c0)) mkdir(0x0, 0x0) mount(0x0, 0x0, &(0x7f00000001c0)='ramfs\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f00000006c0)=ANY=[], 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, 0x0) lsetxattr$trusted_overlay_origin(0x0, 0x0, &(0x7f0000000680)='y\x00', 0x2, 0x1) get_thread_area(0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2e2f66070000ed73d477"], 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2162001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) tkill(0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000540)={@empty, @dev={0xfe, 0x80, [], 0x15}, @loopback, 0x2, 0x400, 0xc089, 0x100, 0x8, 0x80100105}) 03:34:09 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1d, &(0x7f00000027c0)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3f7fffffff2f73451c0e17a606fe530cb7e18ad181867514fe60077d4dd90123d27e7cf43548ce85857ad4a77cb56e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48253f8dbe82e16cf0000000000000000000000000000790ae2fd45d54b107c8c247f195e32f17799d67074"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:09 executing program 3: fchmod(0xffffffffffffffff, 0x36) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 03:34:09 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1d, &(0x7f00000027c0)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3f7fffffff2f73451c0e17a606fe530cb7e18ad181867514fe60077d4dd90123d27e7cf43548ce85857ad4a77cb56e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48253f8dbe82e16cf0000000000000000000000000000790ae2fd45d54b107c8c247f195e32f17799d67074"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:09 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@newlink={0x44, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x18, 0x2, [@IFLA_IPTUN_LOCAL={0x14, 0x14, @mcast1}]}}}]}, 0x44}}, 0x0) 03:34:09 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1d, &(0x7f00000027c0)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3f7fffffff2f73451c0e17a606fe530cb7e18ad181867514fe60077d4dd90123d27e7cf43548ce85857ad4a77cb56e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48253f8dbe82e16cf0000000000000000000000000000790ae2fd45d54b107c8c247f195e32f17799d67074"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:09 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000001c0), 0xfffffef3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r2, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:34:09 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2c, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:09 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2c, &(0x7f00000027c0)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3f7fffffff2f73451c0e17a606fe530cb7e18ad181867514fe60077d4dd90123d27e7cf43548ce85857ad4a77cb56e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48253f8dbe82e16cf0000000000000000000000000000790ae2fd45d54b107c8c247f195e32f17799d6707432ff48bc085763314166443ee72c74f3db890e1ff15a10d91f67e9a22a986e0e244bd117252e47ffda1a869db7e632df4de8572344b419c45c2170fe873692d8255170c16822bdffd313660489c4c953a548ea5480dae93c7e4920a050f7c4cad3d9e75762e06f2954a18bd8464853b36a696e6ee7f2"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:10 executing program 5: r0 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)="13", 0x1, 0xfffffffffffffffe) keyctl$setperm(0x7, r0, 0x0) [ 503.327834] IPVS: ftp: loaded support on port[0] = 21 [ 503.670102] net_ratelimit: 14 callbacks suppressed [ 503.670107] protocol 88fb is buggy, dev hsr_slave_0 [ 503.675164] protocol 88fb is buggy, dev hsr_slave_1 [ 503.675238] protocol 88fb is buggy, dev hsr_slave_0 [ 503.685485] protocol 88fb is buggy, dev hsr_slave_1 03:34:10 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:10 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2c, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) [ 503.990153] protocol 88fb is buggy, dev hsr_slave_0 [ 503.995289] protocol 88fb is buggy, dev hsr_slave_1 03:34:10 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) listen(0xffffffffffffffff, 0x1f) bind$unix(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000002c0)) mkdir(0x0, 0x0) mount(0x0, 0x0, &(0x7f00000001c0)='ramfs\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f00000006c0)=ANY=[], 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, 0x0) lsetxattr$trusted_overlay_origin(0x0, 0x0, &(0x7f0000000680)='y\x00', 0x2, 0x1) get_thread_area(0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="2e2f66070000ed73d477"], 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2162001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) tkill(0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000540)={@empty, @dev={0xfe, 0x80, [], 0x15}, @loopback, 0x2, 0x400, 0xc089, 0x100, 0x8, 0x80100105}) 03:34:10 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) shmctl$SHM_LOCK(0x0, 0xb) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) getgroups(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getpid() r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f00000001c0)=0x2, 0x4) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000080)={0x0, r1/1000+30000}, 0x10) sendto$inet6(r0, &(0x7f00000002c0)="fa01711425a6b42ddc5c46757f6b420f356f4f008ce309074327bfdd3558461fe59a8fd6186e0a11a693ed5f54b054e87042b72df1ce9aa8d1c176bea1239e42ab4119d8ebba7d7572e655238e8156a75410f44a7665b186275f2182aeae9570569bea3a5a5e22475ef4d24a9fa031de380e0d1a5ddf665a39fa4317200e1cf4457dd6a9c3a948a4d159e7c13db66c42327db092a6924604db4343b6386fd648d7e27be1cfc4ebcd71ff34048236cd59a7d4401307f3277e5ed875001a30134ed752a5b811689ab9c8", 0x2a2b178a6daa88db, 0x5, 0x0, 0x0) 03:34:10 executing program 3: fchmod(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 03:34:10 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x33, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:10 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000001c0), 0xfffffef3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r2, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:34:11 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x33, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:11 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x33, &(0x7f00000027c0)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3f7fffffff2f73451c0e17a606fe530cb7e18ad181867514fe60077d4dd90123d27e7cf43548ce85857ad4a77cb56e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48253f8dbe82e16cf0000000000000000000000000000790ae2fd45d54b107c8c247f195e32f17799d6707432ff48bc085763314166443ee72c74f3db890e1ff15a10d91f67e9a22a986e0e244bd117252e47ffda1a869db7e632df4de8572344b419c45c2170fe873692d8255170c16822bdffd313660489c4c953a548ea5480dae93c7e4920a050f7c4cad3d9e75762e06f2954a18bd8464853b36a696e6ee7f2a12b53ecc0a0d4abcb93afea2d32d086635cd6e8da81db762e3446128da56e49b095a052811a0aac9f7c8b4afd65e9351ca78586e9681379f1ede1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:11 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x37, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:11 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x37, &(0x7f00000027c0)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3f7fffffff2f73451c0e17a606fe530cb7e18ad181867514fe60077d4dd90123d27e7cf43548ce85857ad4a77cb56e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48253f8dbe82e16cf0000000000000000000000000000790ae2fd45d54b107c8c247f195e32f17799d6707432ff48bc085763314166443ee72c74f3db890e1ff15a10d91f67e9a22a986e0e244bd117252e47ffda1a869db7e632df4de8572344b419c45c2170fe873692d8255170c16822bdffd313660489c4c953a548ea5480dae93c7e4920a050f7c4cad3d9e75762e06f2954a18bd8464853b36a696e6ee7f2a12b53ecc0a0d4abcb93afea2d32d086635cd6e8da81db762e3446128da56e49b095a052811a0aac9f7c8b4afd65e9351ca78586e9681379f1ede100000000001986978e87a7e61f65163cf8fbfc1ed498c583751798a90dd7"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:11 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x37, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) [ 504.710164] protocol 88fb is buggy, dev hsr_slave_0 [ 504.715465] protocol 88fb is buggy, dev hsr_slave_1 03:34:11 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:11 executing program 3: fchmod(0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) [ 504.801458] protocol 88fb is buggy, dev hsr_slave_0 [ 504.806590] protocol 88fb is buggy, dev hsr_slave_1 03:34:11 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000000)="1d58b8c3cb4b1596d148d2f47a7cff8e3045817ce4f7e99a9e707515e9ab4ae89af00e8859e0f4c85b245eb3fed7ebaa4f84cc937d267657373ae9891103454cb0cf88cdec6cf829c2cf6c70eb905a07fe469604fa6fa93f37407c044f57213384f0f5961b4c3ea0deffafa803d9c5139abb1f60917143e5c4a6e5e11e4db82d3e3995f5", 0x0}, 0x20) setsockopt(r0, 0x400000000ff, 0x7, &(0x7f0000000080), 0x0) 03:34:11 executing program 5: symlink(&(0x7f0000000240)='..', &(0x7f0000000300)='./file0\x00') lsetxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000001380)={0x0, 0xfb, 0x39, 0x0, 0x0, "96df51dca21f6959a585ae45c8bf26a6", "c1b787b2332a80fb0a2a9c0ae2fbda9a60f768845fac5e952feec69d6cb7bdab86a707f6"}, 0x39, 0x0) lsetxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.ima\x00', &(0x7f0000000340)=@v2={0x0, 0x0, 0x0, 0x0, 0xf63, "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"}, 0xf6d, 0x0) 03:34:11 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x39, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:11 executing program 3: fchmod(0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 03:34:11 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r3, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) 03:34:11 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x1d, &(0x7f00000001c0)=0x6, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) 03:34:11 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x39, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:11 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x17, 0x0, 0x40002, 0x1, 0x180}, 0x3c) 03:34:11 executing program 3: fchmod(0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 03:34:12 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x39, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:12 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:12 executing program 5: recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000003900)=""/145, 0x91}, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201fdffffff01000000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 03:34:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x7, &(0x7f0000000040)={0x1}) fcntl$lock(r1, 0x26, &(0x7f00000001c0)) syz_open_procfs(0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) dup3(r0, r1, 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:34:12 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3a, &(0x7f00000027c0)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3f7fffffff2f73451c0e17a606fe530cb7e18ad181867514fe60077d4dd90123d27e7cf43548ce85857ad4a77cb56e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48253f8dbe82e16cf0000000000000000000000000000790ae2fd45d54b107c8c247f195e32f17799d6707432ff48bc085763314166443ee72c74f3db890e1ff15a10d91f67e9a22a986e0e244bd117252e47ffda1a869db7e632df4de8572344b419c45c2170fe873692d8255170c16822bdffd313660489c4c953a548ea5480dae93c7e4920a050f7c4cad3d9e75762e06f2954a18bd8464853b36a696e6ee7f2a12b53ecc0a0d4abcb93afea2d32d086635cd6e8da81db762e3446128da56e49b095a052811a0aac9f7c8b4afd65e9351ca78586e9681379f1ede100000000001986978e87a7e61f65163cf8fbfc1ed498c583751798a90dd7be57d0a09478983a2cb5df5e33789054354c6375f343"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:12 executing program 3: fchmod(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 03:34:12 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3a, &(0x7f00000027c0)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3f7fffffff2f73451c0e17a606fe530cb7e18ad181867514fe60077d4dd90123d27e7cf43548ce85857ad4a77cb56e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48253f8dbe82e16cf0000000000000000000000000000790ae2fd45d54b107c8c247f195e32f17799d6707432ff48bc085763314166443ee72c74f3db890e1ff15a10d91f67e9a22a986e0e244bd117252e47ffda1a869db7e632df4de8572344b419c45c2170fe873692d8255170c16822bdffd313660489c4c953a548ea5480dae93c7e4920a050f7c4cad3d9e75762e06f2954a18bd8464853b36a696e6ee7f2a12b53ecc0a0d4abcb93afea2d32d086635cd6e8da81db762e3446128da56e49b095a052811a0aac9f7c8b4afd65e9351ca78586e9681379f1ede100000000001986978e87a7e61f65163cf8fbfc1ed498c583751798a90dd7be57d0a09478983a2cb5df5e33789054354c6375f343"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) [ 505.771050] loop5: p1 p2[EZD] p3 p4 [ 505.775058] loop5: partition table partially beyond EOD, truncated [ 505.795739] loop5: p1 start 1 is beyond EOD, truncated [ 505.816172] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 505.849794] loop5: p3 size 1912633224 extends beyond EOD, truncated [ 505.889002] loop5: p4 size 32768 extends beyond EOD, truncated 03:34:12 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r3, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) 03:34:12 executing program 3: fchmod(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 03:34:12 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3a, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:12 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000280)='veth0_to_bond\x00', 0x10) sendto$inet(r0, &(0x7f0000000080), 0xffffffffffffff02, 0x420ffe0, 0x0, 0xfffffffffffffd37) 03:34:12 executing program 5: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(0xffffffffffffffff) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ipv6_route\x00') sendfile(r0, r1, 0x0, 0x100000008005) 03:34:12 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3a, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:13 executing program 3: fchmod(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 03:34:13 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3a, &(0x7f00000027c0)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3f7fffffff2f73451c0e17a606fe530cb7e18ad181867514fe60077d4dd90123d27e7cf43548ce85857ad4a77cb56e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48253f8dbe82e16cf0000000000000000000000000000790ae2fd45d54b107c8c247f195e32f17799d6707432ff48bc085763314166443ee72c74f3db890e1ff15a10d91f67e9a22a986e0e244bd117252e47ffda1a869db7e632df4de8572344b419c45c2170fe873692d8255170c16822bdffd313660489c4c953a548ea5480dae93c7e4920a050f7c4cad3d9e75762e06f2954a18bd8464853b36a696e6ee7f2a12b53ecc0a0d4abcb93afea2d32d086635cd6e8da81db762e3446128da56e49b095a052811a0aac9f7c8b4afd65e9351ca78586e9681379f1ede100000000001986978e87a7e61f65163cf8fbfc1ed498c583751798a90dd7be57d0a09478983a2cb5df5e33789054354c6375f343ab6e8838"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:13 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x1ff) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$netlink(0x10, 0x3, 0xf) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() kcmp(r1, 0x0, 0x4, 0xffffffffffffffff, r0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x1) sendfile(0xffffffffffffffff, r0, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x4, 0x0, 0x1, 0x2}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) 03:34:13 executing program 4: rt_sigprocmask(0x0, &(0x7f00000000c0)={0xfffffffffffffffa}, 0x0, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r0, 0x0, 0x420000a77, 0x0) read(r1, &(0x7f0000000080)=""/15, 0xc2) dup3(r3, r1, 0x0) write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[], 0xfffffd88) 03:34:13 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:13 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3a, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:13 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r3, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) 03:34:13 executing program 3: fchmod(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 03:34:13 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3b, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:13 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x1ff) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$netlink(0x10, 0x3, 0xf) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() kcmp(r1, 0x0, 0x4, 0xffffffffffffffff, r0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x1) sendfile(0xffffffffffffffff, r0, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x4, 0x0, 0x1, 0x2}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) 03:34:13 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3b, &(0x7f00000027c0)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3f7fffffff2f73451c0e17a606fe530cb7e18ad181867514fe60077d4dd90123d27e7cf43548ce85857ad4a77cb56e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48253f8dbe82e16cf0000000000000000000000000000790ae2fd45d54b107c8c247f195e32f17799d6707432ff48bc085763314166443ee72c74f3db890e1ff15a10d91f67e9a22a986e0e244bd117252e47ffda1a869db7e632df4de8572344b419c45c2170fe873692d8255170c16822bdffd313660489c4c953a548ea5480dae93c7e4920a050f7c4cad3d9e75762e06f2954a18bd8464853b36a696e6ee7f2a12b53ecc0a0d4abcb93afea2d32d086635cd6e8da81db762e3446128da56e49b095a052811a0aac9f7c8b4afd65e9351ca78586e9681379f1ede100000000001986978e87a7e61f65163cf8fbfc1ed498c583751798a90dd7be57d0a09478983a2cb5df5e33789054354c6375f343ab6e8838ff3d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:13 executing program 3: fchmod(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 03:34:13 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3b, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:13 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x1ff) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$netlink(0x10, 0x3, 0xf) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() kcmp(r1, 0x0, 0x4, 0xffffffffffffffff, r0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x1) sendfile(0xffffffffffffffff, r0, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x4, 0x0, 0x1, 0x2}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) 03:34:13 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3b, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:14 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x1ff) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$netlink(0x10, 0x3, 0xf) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() kcmp(r1, 0x0, 0x4, 0xffffffffffffffff, r0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x1) sendfile(0xffffffffffffffff, r0, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x4, 0x0, 0x1, 0x2}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) 03:34:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x1ff) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$netlink(0x10, 0x3, 0xf) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() kcmp(r1, 0x0, 0x4, 0xffffffffffffffff, r0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x1) sendfile(0xffffffffffffffff, r0, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x4, 0x0, 0x1, 0x2}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) 03:34:14 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) [ 507.634812] x86/PAT: syz-executor.4:15108 freeing invalid memtype [mem 0x3bff00000000-0x3bff00000fff] 03:34:14 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r3, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000), 0x0, 0x0) 03:34:14 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3b, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:14 executing program 3: fchmod(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 03:34:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x14e22, 0x0, @ipv4}, 0x1c) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b4560a067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 03:34:14 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3b, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:14 executing program 3: fchmod(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 03:34:14 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3b, &(0x7f00000027c0)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3f7fffffff2f73451c0e17a606fe530cb7e18ad181867514fe60077d4dd90123d27e7cf43548ce85857ad4a77cb56e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48253f8dbe82e16cf0000000000000000000000000000790ae2fd45d54b107c8c247f195e32f17799d6707432ff48bc085763314166443ee72c74f3db890e1ff15a10d91f67e9a22a986e0e244bd117252e47ffda1a869db7e632df4de8572344b419c45c2170fe873692d8255170c16822bdffd313660489c4c953a548ea5480dae93c7e4920a050f7c4cad3d9e75762e06f2954a18bd8464853b36a696e6ee7f2a12b53ecc0a0d4abcb93afea2d32d086635cd6e8da81db762e3446128da56e49b095a052811a0aac9f7c8b4afd65e9351ca78586e9681379f1ede100000000001986978e87a7e61f65163cf8fbfc1ed498c583751798a90dd7be57d0a09478983a2cb5df5e33789054354c6375f343ab6e8838ff3d6e"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:14 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000005c0)={0x15, 0x10, 0x7, 0x0, 0x180}, 0x3c) 03:34:14 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3b, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) [ 508.870186] net_ratelimit: 16 callbacks suppressed [ 508.870191] protocol 88fb is buggy, dev hsr_slave_0 [ 508.880569] protocol 88fb is buggy, dev hsr_slave_1 [ 508.950193] protocol 88fb is buggy, dev hsr_slave_0 [ 508.955586] protocol 88fb is buggy, dev hsr_slave_1 [ 509.741392] IPVS: ftp: loaded support on port[0] = 21 [ 509.910203] protocol 88fb is buggy, dev hsr_slave_0 [ 509.915505] protocol 88fb is buggy, dev hsr_slave_1 [ 509.920649] protocol 88fb is buggy, dev hsr_slave_0 [ 509.926570] protocol 88fb is buggy, dev hsr_slave_1 [ 510.230180] protocol 88fb is buggy, dev hsr_slave_0 [ 510.235516] protocol 88fb is buggy, dev hsr_slave_1 [ 510.625883] chnl_net:caif_netlink_parms(): no params data found [ 510.664578] bridge0: port 1(bridge_slave_0) entered blocking state [ 510.671258] bridge0: port 1(bridge_slave_0) entered disabled state [ 510.678601] device bridge_slave_0 entered promiscuous mode [ 510.686933] bridge0: port 2(bridge_slave_1) entered blocking state [ 510.693531] bridge0: port 2(bridge_slave_1) entered disabled state [ 510.700792] device bridge_slave_1 entered promiscuous mode [ 510.718708] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 510.728996] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 510.748644] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 510.756314] team0: Port device team_slave_0 added [ 510.762429] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 510.770151] team0: Port device team_slave_1 added [ 510.775555] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 510.783022] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 510.863741] device hsr_slave_0 entered promiscuous mode [ 510.900417] device hsr_slave_1 entered promiscuous mode [ 510.940769] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 510.948192] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 510.962802] bridge0: port 2(bridge_slave_1) entered blocking state [ 510.969476] bridge0: port 2(bridge_slave_1) entered forwarding state [ 510.976271] bridge0: port 1(bridge_slave_0) entered blocking state [ 510.982741] bridge0: port 1(bridge_slave_0) entered forwarding state [ 511.017743] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 511.024501] 8021q: adding VLAN 0 to HW filter on device bond0 [ 511.035183] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 511.044500] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 511.051923] bridge0: port 1(bridge_slave_0) entered disabled state [ 511.069506] bridge0: port 2(bridge_slave_1) entered disabled state [ 511.080008] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 511.086512] 8021q: adding VLAN 0 to HW filter on device team0 [ 511.095442] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 511.103179] bridge0: port 1(bridge_slave_0) entered blocking state [ 511.109669] bridge0: port 1(bridge_slave_0) entered forwarding state [ 511.120695] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 511.128314] bridge0: port 2(bridge_slave_1) entered blocking state [ 511.134851] bridge0: port 2(bridge_slave_1) entered forwarding state [ 511.151049] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 511.160753] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 511.171310] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 511.182309] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 511.193659] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 511.205345] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 511.214343] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 511.222591] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 511.238466] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 511.249421] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 511.610523] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 03:34:19 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) r2 = dup2(r0, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r3, &(0x7f0000003a40)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) ioctl$KDSKBMODE(r2, 0x4b45, 0x0) 03:34:19 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0xc208ae62, &(0x7f0000000080)) 03:34:19 executing program 3: fchmod(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 03:34:19 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3b, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:19 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:19 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r3, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000), 0x0, 0x0) 03:34:19 executing program 3: fchmod(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 03:34:19 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3b, &(0x7f00000027c0)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3f7fffffff2f73451c0e17a606fe530cb7e18ad181867514fe60077d4dd90123d27e7cf43548ce85857ad4a77cb56e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48253f8dbe82e16cf0000000000000000000000000000790ae2fd45d54b107c8c247f195e32f17799d6707432ff48bc085763314166443ee72c74f3db890e1ff15a10d91f67e9a22a986e0e244bd117252e47ffda1a869db7e632df4de8572344b419c45c2170fe873692d8255170c16822bdffd313660489c4c953a548ea5480dae93c7e4920a050f7c4cad3d9e75762e06f2954a18bd8464853b36a696e6ee7f2a12b53ecc0a0d4abcb93afea2d32d086635cd6e8da81db762e3446128da56e49b095a052811a0aac9f7c8b4afd65e9351ca78586e9681379f1ede100000000001986978e87a7e61f65163cf8fbfc1ed498c583751798a90dd7be57d0a09478983a2cb5df5e33789054354c6375f343ab6e8838ff3d6e"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000001c0)='ramfs\x00', 0x100, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) r1 = socket$inet6(0xa, 0x802, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000080)={{0x2, 0x4e20, @loopback}, {0x306, @remote}, 0x0, {0x2, 0x4e23, @empty}}) bind$inet6(r1, &(0x7f000000d000), 0x1c) r2 = gettid() sched_setscheduler(0x0, 0x3, &(0x7f00000001c0)) tkill(r2, 0x17) ioprio_set$pid(0x0, r2, 0x0) connect$inet6(r1, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x2d}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000002c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd6050a09c00081100fe8000000000000000000000000000bbfe8000000000000000000000000000aa00004e2000089078710d0d1953811544c77dc8717c922c4004d450b701996ce5695e2f440f2086c3707a12e27ea27850fd2880b0ebe197a3ebc6adf0b18a150613017ba9b088ee64042b3e859fbb82be9d4e02973bc5c3451c6251b8ffea8665ec1b00813fb540382511e0d4b9ebde367e6ff3e7ecdf0a658635ac9208f56aa4f0015378cc4d4a0e0347359b6fd3175aabb699172b0599d2544a84fbe053c206ffd5b5ec18d2c1d671f45e8ebd3460f1d258d19137"], 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000600)={'team_slave_0\x00'}) 03:34:19 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3b, &(0x7f00000027c0)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3f7fffffff2f73451c0e17a606fe530cb7e18ad181867514fe60077d4dd90123d27e7cf43548ce85857ad4a77cb56e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48253f8dbe82e16cf0000000000000000000000000000790ae2fd45d54b107c8c247f195e32f17799d6707432ff48bc085763314166443ee72c74f3db890e1ff15a10d91f67e9a22a986e0e244bd117252e47ffda1a869db7e632df4de8572344b419c45c2170fe873692d8255170c16822bdffd313660489c4c953a548ea5480dae93c7e4920a050f7c4cad3d9e75762e06f2954a18bd8464853b36a696e6ee7f2a12b53ecc0a0d4abcb93afea2d32d086635cd6e8da81db762e3446128da56e49b095a052811a0aac9f7c8b4afd65e9351ca78586e9681379f1ede100000000001986978e87a7e61f65163cf8fbfc1ed498c583751798a90dd7be57d0a09478983a2cb5df5e33789054354c6375f343ab6e8838ff3d6e"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:19 executing program 3: fchmod(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 03:34:19 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3b, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:19 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) [ 513.400919] device bridge_slave_1 left promiscuous mode [ 513.406526] bridge0: port 2(bridge_slave_1) entered disabled state [ 513.450980] device bridge_slave_0 left promiscuous mode [ 513.456543] bridge0: port 1(bridge_slave_0) entered disabled state [ 513.573179] device hsr_slave_1 left promiscuous mode [ 513.614055] device hsr_slave_0 left promiscuous mode [ 513.656156] team0 (unregistering): Port device team_slave_1 removed [ 513.666169] team0 (unregistering): Port device team_slave_0 removed [ 513.675832] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 513.714553] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 513.785247] bond0 (unregistering): Released all slaves [ 514.070156] net_ratelimit: 22 callbacks suppressed [ 514.070161] protocol 88fb is buggy, dev hsr_slave_0 [ 514.080543] protocol 88fb is buggy, dev hsr_slave_1 [ 514.085832] protocol 88fb is buggy, dev hsr_slave_0 [ 514.091078] protocol 88fb is buggy, dev hsr_slave_1 [ 514.390123] protocol 88fb is buggy, dev hsr_slave_0 [ 514.395268] protocol 88fb is buggy, dev hsr_slave_1 [ 515.120166] protocol 88fb is buggy, dev hsr_slave_0 [ 515.125268] protocol 88fb is buggy, dev hsr_slave_1 [ 515.190248] protocol 88fb is buggy, dev hsr_slave_0 [ 515.195482] protocol 88fb is buggy, dev hsr_slave_1 [ 515.570970] IPVS: ftp: loaded support on port[0] = 21 [ 516.427661] chnl_net:caif_netlink_parms(): no params data found [ 516.466947] bridge0: port 1(bridge_slave_0) entered blocking state [ 516.473525] bridge0: port 1(bridge_slave_0) entered disabled state [ 516.480981] device bridge_slave_0 entered promiscuous mode [ 516.488821] bridge0: port 2(bridge_slave_1) entered blocking state [ 516.495860] bridge0: port 2(bridge_slave_1) entered disabled state [ 516.503200] device bridge_slave_1 entered promiscuous mode [ 516.520455] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 516.529322] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 516.548537] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 516.556118] team0: Port device team_slave_0 added [ 516.561878] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 516.568989] team0: Port device team_slave_1 added [ 516.574555] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 516.582584] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 516.633088] device hsr_slave_0 entered promiscuous mode [ 516.670379] device hsr_slave_1 entered promiscuous mode [ 516.720758] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 516.727751] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 516.743583] bridge0: port 2(bridge_slave_1) entered blocking state [ 516.749989] bridge0: port 2(bridge_slave_1) entered forwarding state [ 516.756867] bridge0: port 1(bridge_slave_0) entered blocking state [ 516.763277] bridge0: port 1(bridge_slave_0) entered forwarding state [ 516.792894] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 516.799116] 8021q: adding VLAN 0 to HW filter on device bond0 [ 516.808050] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 516.816980] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 516.825032] bridge0: port 1(bridge_slave_0) entered disabled state [ 516.842937] bridge0: port 2(bridge_slave_1) entered disabled state [ 516.854521] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 516.861181] 8021q: adding VLAN 0 to HW filter on device team0 [ 516.870367] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 516.878478] bridge0: port 1(bridge_slave_0) entered blocking state [ 516.885019] bridge0: port 1(bridge_slave_0) entered forwarding state [ 516.896680] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 516.904941] bridge0: port 2(bridge_slave_1) entered blocking state [ 516.911689] bridge0: port 2(bridge_slave_1) entered forwarding state [ 516.928333] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 516.936460] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 516.952640] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 516.962929] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 516.973644] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 516.980470] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 516.988061] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 516.996054] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 517.009333] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 517.016512] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 517.028931] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 517.410500] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 03:34:24 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'veth0\x00\x00\x00\x00\x01\x00', 0x0}) bind$packet(r0, &(0x7f0000000a00)={0x11, 0x0, r1}, 0x14) sendto$inet6(r0, &(0x7f0000000440)="03030000007f4c0000001100fff55b4202938207d9fb3780398d5375000000007929301ee616d5c01843e06590080053a6e385472da7222a2bb401000000c3b50035110f118d0000f5cfe606f6925cbf34658ea132797b1a", 0x58, 0x0, 0x0, 0x0) 03:34:24 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x0) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f00000000c0)) setsockopt$packet_int(r1, 0x107, 0x0, &(0x7f0000000040), 0x4) capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000200)) r2 = gettid() r3 = dup(r0) getsockopt$IPT_SO_GET_ENTRIES(r3, 0x0, 0x41, 0x0, &(0x7f0000000440)=0xd18ee39529a0087c) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x800000002c) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 03:34:24 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:24 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r3, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000), 0x0, 0x0) 03:34:24 executing program 3: fchmod(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 03:34:25 executing program 3: fchmod(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 03:34:25 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000027c0)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3f7fffffff2f73451c0e17a606fe530cb7e18ad181867514fe60077d4dd90123d27e7cf43548ce85857ad4a77cb56e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48253f8dbe82e16cf0000000000000000000000000000790ae2fd45d54b107c8c247f195e32f17799d6707432ff48bc085763314166443ee72c74f3db890e1ff15a10d91f67e9a22a986e0e244bd117252e47ffda1a869db7e632df4de8572344b419c45c2170fe873692d8255170c16822bdffd313660489c4c953a548ea5480dae93c7e4920a050f7c4cad3d9e75762e06f2954a18bd8464853b36a696e6ee7f2a12b53ecc0a0d4abcb93afea2d32d086635cd6e8da81db762e3446128da56e49b095a052811a0aac9f7c8b4afd65e9351ca78586e9681379f1ede100000000001986978e87a7e61f65163cf8fbfc1ed498c583751798a90dd7be57d0a09478983a2cb5df5e33789054354c6375f343ab6e8838ff3d6e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:25 executing program 3: fchmod(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 03:34:25 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x10005812}) r2 = semget$private(0x0, 0x0, 0x4) semctl$GETALL(r2, 0x0, 0xd, &(0x7f0000000140)=""/61) semctl$SEM_INFO(r2, 0x3, 0x13, &(0x7f00000007c0)=""/153) semctl$SEM_INFO(r2, 0x0, 0x13, &(0x7f00000004c0)=""/167) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = memfd_create(&(0x7f00000001c0)='#! ', 0x0) mknod$loop(&(0x7f0000000040)='./file1\x00', 0x211, 0xffffffffffffffff) r4 = dup3(r0, r0, 0x80000) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000440)={0x0, {0x2, 0x4e23, @rand_addr=0x100000000}, {0x2, 0x4e20, @remote}, {0x2, 0x4e20, @empty}, 0x100, 0x0, 0x0, 0x0, 0x8000, &(0x7f0000000140)='lapb0\x00', 0x0, 0xfffffffffffffffc, 0x9}) prctl$PR_GET_DUMPABLE(0x3) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/uts\x00') write$binfmt_script(r3, &(0x7f0000000280)={'#! ', './file1', [{0x20, '#! '}]}, 0xf) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) io_setup(0x2, &(0x7f0000000240)=0x0) pread64(r1, &(0x7f0000000380)=""/162, 0xa2, 0x0) io_submit(r5, 0x1, &(0x7f00000002c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000340)='\t', 0x1}]) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00\x14\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 03:34:25 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000027c0)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3f7fffffff2f73451c0e17a606fe530cb7e18ad181867514fe60077d4dd90123d27e7cf43548ce85857ad4a77cb56e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48253f8dbe82e16cf0000000000000000000000000000790ae2fd45d54b107c8c247f195e32f17799d6707432ff48bc085763314166443ee72c74f3db890e1ff15a10d91f67e9a22a986e0e244bd117252e47ffda1a869db7e632df4de8572344b419c45c2170fe873692d8255170c16822bdffd313660489c4c953a548ea5480dae93c7e4920a050f7c4cad3d9e75762e06f2954a18bd8464853b36a696e6ee7f2a12b53ecc0a0d4abcb93afea2d32d086635cd6e8da81db762e3446128da56e49b095a052811a0aac9f7c8b4afd65e9351ca78586e9681379f1ede100000000001986978e87a7e61f65163cf8fbfc1ed498c583751798a90dd7be57d0a09478983a2cb5df5e33789054354c6375f343ab6e8838ff3d6e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:25 executing program 3: fchmod(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 03:34:25 executing program 3: fchmod(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 03:34:25 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) [ 519.270209] net_ratelimit: 24 callbacks suppressed [ 519.270213] protocol 88fb is buggy, dev hsr_slave_0 [ 519.280493] protocol 88fb is buggy, dev hsr_slave_1 [ 519.350150] protocol 88fb is buggy, dev hsr_slave_0 [ 519.355406] protocol 88fb is buggy, dev hsr_slave_1 [ 519.510370] protocol 88fb is buggy, dev hsr_slave_0 [ 519.515671] protocol 88fb is buggy, dev hsr_slave_1 [ 520.300924] IPVS: ftp: loaded support on port[0] = 21 [ 520.310180] protocol 88fb is buggy, dev hsr_slave_0 [ 520.315298] protocol 88fb is buggy, dev hsr_slave_1 [ 520.320582] protocol 88fb is buggy, dev hsr_slave_0 [ 520.325758] protocol 88fb is buggy, dev hsr_slave_1 [ 521.287618] chnl_net:caif_netlink_parms(): no params data found [ 521.327625] bridge0: port 1(bridge_slave_0) entered blocking state [ 521.334795] bridge0: port 1(bridge_slave_0) entered disabled state [ 521.342568] device bridge_slave_0 entered promiscuous mode [ 521.349285] bridge0: port 2(bridge_slave_1) entered blocking state [ 521.356301] bridge0: port 2(bridge_slave_1) entered disabled state [ 521.363492] device bridge_slave_1 entered promiscuous mode [ 521.384537] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 521.394802] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 521.416322] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 521.423760] team0: Port device team_slave_0 added [ 521.429252] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 521.436730] team0: Port device team_slave_1 added [ 521.442198] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 521.449524] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 521.514036] device hsr_slave_0 entered promiscuous mode [ 521.550385] device hsr_slave_1 entered promiscuous mode [ 521.600724] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 521.607849] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 521.622708] bridge0: port 2(bridge_slave_1) entered blocking state [ 521.629329] bridge0: port 2(bridge_slave_1) entered forwarding state [ 521.635998] bridge0: port 1(bridge_slave_0) entered blocking state [ 521.642378] bridge0: port 1(bridge_slave_0) entered forwarding state [ 521.676185] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 521.682712] 8021q: adding VLAN 0 to HW filter on device bond0 [ 521.692000] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 521.701619] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 521.709021] bridge0: port 1(bridge_slave_0) entered disabled state [ 521.716203] bridge0: port 2(bridge_slave_1) entered disabled state [ 521.726588] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 521.733174] 8021q: adding VLAN 0 to HW filter on device team0 [ 521.742915] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 521.751303] bridge0: port 1(bridge_slave_0) entered blocking state [ 521.757666] bridge0: port 1(bridge_slave_0) entered forwarding state [ 521.779987] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 521.788050] bridge0: port 2(bridge_slave_1) entered blocking state [ 521.794481] bridge0: port 2(bridge_slave_1) entered forwarding state [ 521.802702] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 521.810868] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 521.818428] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 521.826372] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 521.836263] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 521.847051] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 521.854184] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 521.868173] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 521.879435] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 522.270716] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 03:34:29 executing program 4: 03:34:29 executing program 3: fchmod(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 03:34:29 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000027c0)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3f7fffffff2f73451c0e17a606fe530cb7e18ad181867514fe60077d4dd90123d27e7cf43548ce85857ad4a77cb56e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48253f8dbe82e16cf0000000000000000000000000000790ae2fd45d54b107c8c247f195e32f17799d6707432ff48bc085763314166443ee72c74f3db890e1ff15a10d91f67e9a22a986e0e244bd117252e47ffda1a869db7e632df4de8572344b419c45c2170fe873692d8255170c16822bdffd313660489c4c953a548ea5480dae93c7e4920a050f7c4cad3d9e75762e06f2954a18bd8464853b36a696e6ee7f2a12b53ecc0a0d4abcb93afea2d32d086635cd6e8da81db762e3446128da56e49b095a052811a0aac9f7c8b4afd65e9351ca78586e9681379f1ede100000000001986978e87a7e61f65163cf8fbfc1ed498c583751798a90dd7be57d0a09478983a2cb5df5e33789054354c6375f343ab6e8838ff3d6e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:29 executing program 5: 03:34:29 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r3, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 03:34:29 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) [ 523.169334] ptrace attach of "/root/syz-executor.5"[18767] was attempted by "/root/syz-executor.5"[18768] 03:34:29 executing program 4: 03:34:29 executing program 3: fchmod(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 03:34:29 executing program 5: 03:34:30 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:30 executing program 4: 03:34:30 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:30 executing program 5: 03:34:30 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:30 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r3, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 03:34:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x1ff) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x8000, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r1}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() kcmp(r2, 0x0, 0x4, 0xffffffffffffffff, r0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x1) sendfile(0xffffffffffffffff, r0, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x4, 0x0, 0x1, 0x2}) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) lseek(r3, 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, &(0x7f0000000380)="440f20c0663501000000440f22c066b8001000000f23c00f21f8663500000a000f23f83e660f384120f30fc77200ba4100b004eef2e509baf80c66b887d5518066efbafc0cec0fc72c67653e0fc7b9090000000f01c2", 0x56}], 0x1, 0x0, &(0x7f0000000300)=[@dstype3={0x7, 0xa}, @flags={0x3, 0x244210}], 0x2) r5 = openat$cgroup_ro(r4, &(0x7f0000000300)='pids.events\x00', 0x0, 0x0) write$P9_RRENAME(r5, &(0x7f0000000340)={0x7, 0x15, 0x1}, 0x7) write$P9_RGETATTR(r3, 0x0, 0x0) r6 = socket(0x8000000000000010, 0x2, 0x0) write(r6, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea080001001c7a6cb4", 0x24) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r8, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 03:34:30 executing program 4: seccomp(0x5cd967147150689a, 0x0, 0x0) 03:34:30 executing program 3: fchmod(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 03:34:30 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:30 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(0xffffffffffffffff, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:30 executing program 4: quotactl(0x0, 0x0, 0x0, &(0x7f0000000280)="b66fd0d7cde84fe6f5da49699d") prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:34:30 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(0xffffffffffffffff, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x1ff) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x8000, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r1}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() kcmp(r2, 0x0, 0x4, 0xffffffffffffffff, r0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x1) sendfile(0xffffffffffffffff, r0, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x4, 0x0, 0x1, 0x2}) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) lseek(r3, 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, &(0x7f0000000380)="440f20c0663501000000440f22c066b8001000000f23c00f21f8663500000a000f23f83e660f384120f30fc77200ba4100b004eef2e509baf80c66b887d5518066efbafc0cec0fc72c67653e0fc7b9090000000f01c2", 0x56}], 0x1, 0x0, &(0x7f0000000300)=[@dstype3={0x7, 0xa}, @flags={0x3, 0x244210}], 0x2) r5 = openat$cgroup_ro(r4, &(0x7f0000000300)='pids.events\x00', 0x0, 0x0) write$P9_RRENAME(r5, &(0x7f0000000340)={0x7, 0x15, 0x1}, 0x7) write$P9_RGETATTR(r3, 0x0, 0x0) r6 = socket(0x8000000000000010, 0x2, 0x0) write(r6, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea080001001c7a6cb4", 0x24) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r8, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 03:34:30 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:31 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(0xffffffffffffffff, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:31 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x1ff) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x8000, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r1}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() kcmp(r2, 0x0, 0x4, 0xffffffffffffffff, r0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x1) sendfile(0xffffffffffffffff, r0, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x4, 0x0, 0x1, 0x2}) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) lseek(r3, 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, &(0x7f0000000380)="440f20c0663501000000440f22c066b8001000000f23c00f21f8663500000a000f23f83e660f384120f30fc77200ba4100b004eef2e509baf80c66b887d5518066efbafc0cec0fc72c67653e0fc7b9090000000f01c2", 0x56}], 0x1, 0x0, &(0x7f0000000300)=[@dstype3={0x7, 0xa}, @flags={0x3, 0x244210}], 0x2) r5 = openat$cgroup_ro(r4, &(0x7f0000000300)='pids.events\x00', 0x0, 0x0) write$P9_RRENAME(r5, &(0x7f0000000340)={0x7, 0x15, 0x1}, 0x7) write$P9_RGETATTR(r3, 0x0, 0x0) r6 = socket(0x8000000000000010, 0x2, 0x0) write(r6, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea080001001c7a6cb4", 0x24) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r8, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) [ 524.390248] net_ratelimit: 28 callbacks suppressed [ 524.390253] protocol 88fb is buggy, dev hsr_slave_0 [ 524.400668] protocol 88fb is buggy, dev hsr_slave_1 [ 524.470355] protocol 88fb is buggy, dev hsr_slave_0 [ 524.475470] protocol 88fb is buggy, dev hsr_slave_1 [ 524.480625] protocol 88fb is buggy, dev hsr_slave_0 [ 524.485718] protocol 88fb is buggy, dev hsr_slave_1 [ 524.790115] protocol 88fb is buggy, dev hsr_slave_0 [ 524.795386] protocol 88fb is buggy, dev hsr_slave_1 03:34:31 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:31 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(r3, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 03:34:31 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:31 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x5f5e0ff}]}]}}, &(0x7f00000002c0)=""/200, 0x32, 0xc8, 0x1}, 0x20) 03:34:31 executing program 3: fchmod(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 03:34:31 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x1ff) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x8000, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r1}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() kcmp(r2, 0x0, 0x4, 0xffffffffffffffff, r0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x1) sendfile(0xffffffffffffffff, r0, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x4, 0x0, 0x1, 0x2}) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) lseek(r3, 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, &(0x7f0000000380)="440f20c0663501000000440f22c066b8001000000f23c00f21f8663500000a000f23f83e660f384120f30fc77200ba4100b004eef2e509baf80c66b887d5518066efbafc0cec0fc72c67653e0fc7b9090000000f01c2", 0x56}], 0x1, 0x0, &(0x7f0000000300)=[@dstype3={0x7, 0xa}, @flags={0x3, 0x244210}], 0x2) r5 = openat$cgroup_ro(r4, &(0x7f0000000300)='pids.events\x00', 0x0, 0x0) write$P9_RRENAME(r5, &(0x7f0000000340)={0x7, 0x15, 0x1}, 0x7) write$P9_RGETATTR(r3, 0x0, 0x0) r6 = socket(0x8000000000000010, 0x2, 0x0) write(r6, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea080001001c7a6cb4", 0x24) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r8, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 03:34:31 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:31 executing program 4: r0 = socket(0x10, 0x80002, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0x3}, {0x6}]}, 0x10) 03:34:31 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) [ 525.090504] device bridge_slave_1 left promiscuous mode [ 525.096049] bridge0: port 2(bridge_slave_1) entered disabled state 03:34:31 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) [ 525.161077] device bridge_slave_0 left promiscuous mode [ 525.178650] bridge0: port 1(bridge_slave_0) entered disabled state 03:34:32 executing program 4: setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x84) kexec_load(0x0, 0x1000000000000003, &(0x7f0000000000)=[{0x0, 0xffffffffffffff2f, 0x0, 0x2000000}], 0x3e0001) 03:34:32 executing program 2: mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:32 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f000060cff8)='/', 0x0, 0x0) getsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000080), 0x4) unshare(0x24020400) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='batadv0\x00', 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r1, &(0x7f0000000100), 0x4000000000001af, 0x0) [ 525.484896] device hsr_slave_1 left promiscuous mode [ 525.510116] protocol 88fb is buggy, dev hsr_slave_0 [ 525.515390] protocol 88fb is buggy, dev hsr_slave_1 [ 525.554443] device hsr_slave_0 left promiscuous mode [ 525.586275] team0 (unregistering): Port device team_slave_1 removed [ 525.636067] team0 (unregistering): Port device team_slave_0 removed [ 525.716949] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 525.789468] bond0 (unregistering): Releasing backup interface bond_slave_0 03:34:32 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_SET_CPUID2(0xffffffffffffffff, 0x4008ae90, &(0x7f0000000300)=ANY=[@ANYBLOB="02000041e794a7b200000000000019000090090000000300169112aa0000220000000300150a000000090000cebe0110000001008db386cb9a07631813a8d2000000000000"]) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0xff], 0x1f004}) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000400)) ioctl$KVM_RUN(r2, 0xae80, 0x900000000000000) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000000)={0x0, {{0x2, 0x0, @remote}}}, 0x84) syz_open_procfs(0x0, 0x0) 03:34:32 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0xfffffffffffffffb) 03:34:32 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) [ 525.948414] bond0 (unregistering): Released all slaves [ 527.721461] IPVS: ftp: loaded support on port[0] = 21 [ 528.584769] chnl_net:caif_netlink_parms(): no params data found [ 528.624216] bridge0: port 1(bridge_slave_0) entered blocking state [ 528.631036] bridge0: port 1(bridge_slave_0) entered disabled state [ 528.638272] device bridge_slave_0 entered promiscuous mode [ 528.645009] bridge0: port 2(bridge_slave_1) entered blocking state [ 528.651499] bridge0: port 2(bridge_slave_1) entered disabled state [ 528.658477] device bridge_slave_1 entered promiscuous mode [ 528.678312] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 528.687517] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 528.705896] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 528.714809] team0: Port device team_slave_0 added [ 528.720487] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 528.727774] team0: Port device team_slave_1 added [ 528.733314] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 528.740801] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 528.802793] device hsr_slave_0 entered promiscuous mode [ 528.850387] device hsr_slave_1 entered promiscuous mode [ 528.890748] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 528.897851] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 528.912337] bridge0: port 2(bridge_slave_1) entered blocking state [ 528.918798] bridge0: port 2(bridge_slave_1) entered forwarding state [ 528.925540] bridge0: port 1(bridge_slave_0) entered blocking state [ 528.932101] bridge0: port 1(bridge_slave_0) entered forwarding state [ 528.963777] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 528.970344] 8021q: adding VLAN 0 to HW filter on device bond0 [ 528.979006] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 528.988356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 528.996042] bridge0: port 1(bridge_slave_0) entered disabled state [ 529.003760] bridge0: port 2(bridge_slave_1) entered disabled state [ 529.013828] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 529.020696] 8021q: adding VLAN 0 to HW filter on device team0 [ 529.029605] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 529.037485] bridge0: port 1(bridge_slave_0) entered blocking state [ 529.043989] bridge0: port 1(bridge_slave_0) entered forwarding state [ 529.054723] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 529.062774] bridge0: port 2(bridge_slave_1) entered blocking state [ 529.069133] bridge0: port 2(bridge_slave_1) entered forwarding state [ 529.090351] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 529.100967] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 529.111456] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 529.118438] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 529.127066] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 529.135111] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 529.142883] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 529.150958] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 529.157760] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 529.172453] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 529.184313] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 529.470192] net_ratelimit: 26 callbacks suppressed [ 529.470198] protocol 88fb is buggy, dev hsr_slave_0 [ 529.480524] protocol 88fb is buggy, dev hsr_slave_1 [ 529.570721] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 529.590172] protocol 88fb is buggy, dev hsr_slave_0 [ 529.595445] protocol 88fb is buggy, dev hsr_slave_1 [ 529.670213] protocol 88fb is buggy, dev hsr_slave_0 [ 529.675399] protocol 88fb is buggy, dev hsr_slave_1 [ 529.760240] protocol 88fb is buggy, dev hsr_slave_0 [ 529.765340] protocol 88fb is buggy, dev hsr_slave_1 [ 529.910404] protocol 88fb is buggy, dev hsr_slave_0 [ 529.915502] protocol 88fb is buggy, dev hsr_slave_1 03:34:37 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x147, 0x200007fd, &(0x7f00000000c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf922157511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x2000, 0x0) ioctl$TIOCEXCL(r1, 0x540c) syz_genetlink_get_family_id$tipc2(0x0) dup(0xffffffffffffffff) ioctl$KVM_GET_PIT(0xffffffffffffffff, 0xc048ae65, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000180)) 03:34:37 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 03:34:37 executing program 1: ioctl$KVM_S390_UCAS_UNMAP(0xffffffffffffffff, 0x4018ae51, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="2400000002031f001cfffd946fa2830020200a800900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a0009000100021d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, &(0x7f0000000980)={[{0x0, 0x0, 0x100000001, 0x5e, 0x7fff, 0x0, 0xffffffffffffffff, 0x0, 0x7089, 0x4, 0x7}, {0x0, 0x0, 0x0, 0x3ff, 0x80000001, 0x7e7, 0x0, 0x4, 0x9, 0x6, 0x0, 0x0, 0x6}, {0x100000000, 0x7fff, 0x2, 0x6, 0x0, 0x8, 0x0, 0x4, 0x6, 0x80000000, 0x9}], 0x7}) mkdirat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0xffffffffffffffff) stat(&(0x7f0000000640)='./file1\x00', 0x0) 03:34:37 executing program 2: mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:37 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x345ab47ebc511c74, 0x0, 0x0, "1dbc59e7baab9e643989149241eab6ed4f4b58025498ff33adfbc10b1b37909671367ccdfefb4b719261a1553b806af921c9cec2c70a7b26eef8fc87d916177c", "e218469b2e01282095a0e31fd0b6355953e484693ff1ffa492f4924b8e80269e"}) 03:34:37 executing program 3: fchmod(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 03:34:37 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 03:34:37 executing program 2: mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:37 executing program 3: fchmod(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) [ 530.613952] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 03:34:37 executing program 5: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x807812f0, &(0x7f0000000040)) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) 03:34:37 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={0xffffffffffffffff, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:37 executing program 4: r0 = getpgrp(0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) read(r1, &(0x7f0000000540)=""/250, 0xfa) [ 530.676995] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 03:34:37 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:37 executing program 3: fchmod(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) [ 530.761729] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 03:34:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:34:37 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={0xffffffffffffffff, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) 03:34:37 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:37 executing program 3: fchmod(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x400000000000064, 0x0) 03:34:37 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:37 executing program 3: fchmod(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x400000000000064, 0x0) 03:34:37 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={0xffffffffffffffff, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) [ 531.430554] device bridge_slave_1 left promiscuous mode [ 531.436149] bridge0: port 2(bridge_slave_1) entered disabled state [ 531.490893] device bridge_slave_0 left promiscuous mode [ 531.496611] bridge0: port 1(bridge_slave_0) entered disabled state [ 531.644004] device hsr_slave_1 left promiscuous mode [ 531.699628] device hsr_slave_0 left promiscuous mode [ 531.733554] team0 (unregistering): Port device team_slave_1 removed [ 531.743841] team0 (unregistering): Port device team_slave_0 removed [ 531.754851] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 531.804827] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 531.873213] bond0 (unregistering): Released all slaves [ 533.820990] IPVS: ftp: loaded support on port[0] = 21 [ 534.670540] chnl_net:caif_netlink_parms(): no params data found [ 534.714431] bridge0: port 1(bridge_slave_0) entered blocking state [ 534.722238] bridge0: port 1(bridge_slave_0) entered disabled state [ 534.732440] device bridge_slave_0 entered promiscuous mode [ 534.739743] bridge0: port 2(bridge_slave_1) entered blocking state [ 534.746716] bridge0: port 2(bridge_slave_1) entered disabled state [ 534.754078] device bridge_slave_1 entered promiscuous mode [ 534.774500] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 534.784928] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 534.804947] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 534.812353] team0: Port device team_slave_0 added [ 534.818015] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 534.825601] team0: Port device team_slave_1 added [ 534.831191] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 534.838699] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 534.870152] net_ratelimit: 24 callbacks suppressed [ 534.870157] protocol 88fb is buggy, dev hsr_slave_0 [ 534.880233] protocol 88fb is buggy, dev hsr_slave_1 [ 534.885446] protocol 88fb is buggy, dev hsr_slave_0 [ 534.890638] protocol 88fb is buggy, dev hsr_slave_1 [ 534.915918] device hsr_slave_0 entered promiscuous mode [ 534.960394] device hsr_slave_1 entered promiscuous mode [ 535.000686] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 535.007689] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 535.022030] bridge0: port 2(bridge_slave_1) entered blocking state [ 535.028420] bridge0: port 2(bridge_slave_1) entered forwarding state [ 535.035157] bridge0: port 1(bridge_slave_0) entered blocking state [ 535.041542] bridge0: port 1(bridge_slave_0) entered forwarding state [ 535.082730] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 535.089496] 8021q: adding VLAN 0 to HW filter on device bond0 [ 535.099231] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 535.109060] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 535.118614] bridge0: port 1(bridge_slave_0) entered disabled state [ 535.126010] bridge0: port 2(bridge_slave_1) entered disabled state [ 535.136191] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 535.142951] 8021q: adding VLAN 0 to HW filter on device team0 [ 535.153083] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 535.161780] bridge0: port 1(bridge_slave_0) entered blocking state [ 535.168271] bridge0: port 1(bridge_slave_0) entered forwarding state [ 535.177973] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 535.185851] bridge0: port 2(bridge_slave_1) entered blocking state [ 535.192384] bridge0: port 2(bridge_slave_1) entered forwarding state [ 535.199087] protocol 88fb is buggy, dev hsr_slave_0 [ 535.204254] protocol 88fb is buggy, dev hsr_slave_1 [ 535.221728] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 535.229481] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 535.237731] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 535.254455] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 535.265027] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 535.277750] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 535.285527] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 535.293620] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 535.307184] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 535.314063] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 535.326873] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 535.400238] protocol 88fb is buggy, dev hsr_slave_0 [ 535.405430] protocol 88fb is buggy, dev hsr_slave_1 [ 535.520252] protocol 88fb is buggy, dev hsr_slave_0 [ 535.525371] protocol 88fb is buggy, dev hsr_slave_1 [ 535.660523] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 03:34:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000015000)=0x1004, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @local}, 0x10) listen(r1, 0x0) migrate_pages(0x0, 0x5, 0x0, &(0x7f0000000040)=0x8001) 03:34:43 executing program 1: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc05812fe, 0x0) 03:34:43 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:43 executing program 3: fchmod(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x400000000000064, 0x0) 03:34:43 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0x0, 0x0, 0x0, 0x0, 0x100, 0xf2ffffff}, 0x40) 03:34:43 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'bond_slave_1\x00', &(0x7f0000000200)=@ethtool_gstrings={0x1b, 0x1}}) 03:34:43 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000027c0)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3f7fffffff2f73451c0e17a606fe530cb7e18ad181867514fe60077d4dd90123d27e7cf43548ce85857ad4a77cb56e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48253f8dbe82e16cf0000000000000000000000000000790ae2fd45d54b107c8c247f195e32f17799d6707432ff48bc085763314166443ee72c74f3db890e1ff15a10d91f67e9a22a986e0e244bd117252e47ffda1a869db7e632df4de8572344b419c45c2170fe873692d8255170c16822bdffd313660489c4c953a548ea5480dae93c7e4920a050f7c4cad3d9e75762e06f2954a18bd8464853b36a696e6ee7f2a12b53ecc0a0d4abcb93afea2d32d086635cd6e8da81db762e3446128da56e49b095a052811a0aac9f7c8b4afd65e9351ca78586e9681379f1ede100000000001986978e87a7e61f65163cf8fbfc1ed498c583751798a90dd7be57d0a09478983a2cb5df5e33789054354c6375f343ab6e8838ff3d6e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0x0, 0x0, 0x0, 0x0, 0x100, 0xf2ffffff}, 0x40) 03:34:43 executing program 3: fchmod(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r0, 0x0, 0x0, 0x0) 03:34:43 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x9, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x161, 0x11, 0x78}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 03:34:43 executing program 1: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x200000007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@workdir={'workdir', 0x3d, './file0'}, 0xa}]}) 03:34:43 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000016ffc)=0xfffff7fffffffffd, 0x4) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000015000)=0x1004, 0x4) bind$inet(r0, &(0x7f0000008ff0)={0x2, 0x4e20, @local}, 0x10) listen(r1, 0x0) migrate_pages(0x0, 0x5, 0x0, &(0x7f0000000040)=0x8001) 03:34:43 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0xffffff3b, 0x0}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r1, &(0x7f00000001c0), &(0x7f0000000100)=""/108}, 0x18) [ 536.547278] overlayfs: option "workdir=./file0 [ 536.547278] " is useless in a non-upper mount, ignore [ 536.575532] overlayfs: option "workdir=./file0 [ 536.575532] " is useless in a non-upper mount, ignore 03:34:43 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:43 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0x0, 0x0, 0x0, 0x0, 0x100, 0xf2ffffff}, 0x40) 03:34:43 executing program 3: fchmod(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r0, 0x0, 0x0, 0x0) 03:34:43 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000040)=0x1f, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) [ 536.644549] overlayfs: missing 'lowerdir' [ 536.655456] overlayfs: missing 'lowerdir' 03:34:43 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff824f400005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000c659ca807737f40000002b000000170800000000000020200000000000000000bfbbb18016410f67f8ed2fbda6599591076756fcb9ff7daf0bdd7cfa3d4ade61ccb14424af8c63ab6fd1845b0c90c78bf8059655", 0x58}], 0x2) 03:34:43 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:43 executing program 3: fchmod(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r0, 0x0, 0x0, 0x0) 03:34:43 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000001440)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a61db563e98b4b2a3d27a7082dbb78abd55fba3dc82f01bfb4a67cf621d6234555c08dc540473753cd89e9b06c3f5972fe9ca162b123e192e8c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000480)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) setxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.upper\xa0', 0x0, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 03:34:43 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x100, 0xf2ffffff}, 0x40) 03:34:43 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0xffffff3b, 0x0}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r1, &(0x7f00000001c0), &(0x7f0000000100)=""/108}, 0x18) 03:34:43 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:43 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x100, 0xf2ffffff}, 0x40) 03:34:43 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0xffffff3b, 0x0}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r1, &(0x7f00000001c0), &(0x7f0000000100)=""/108}, 0x18) 03:34:43 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)=@ipv4_delrule={0x20, 0x21, 0x93403a352db30171, 0x0, 0x0, {0x2, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10004}}, 0x20}}, 0x0) 03:34:43 executing program 3: write$P9_RUNLINKAT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x80003, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x101904, 0x20) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r1, 0x0) ioctl$PIO_FONTRESET(r2, 0x4b6d, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1ff) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000100)=""/103) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000200)=0x2) geteuid() 03:34:43 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = gettid() setsockopt$inet_int(r0, 0x0, 0x15, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x23) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 03:34:43 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:43 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0xffffff3b, 0x0}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r1, &(0x7f00000001c0), &(0x7f0000000100)=""/108}, 0x18) 03:34:43 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x100, 0xf2ffffff}, 0x40) 03:34:43 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x161, 0x11, 0x84}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 03:34:43 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:43 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0xffffff3b, 0x0}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r1, &(0x7f00000001c0), &(0x7f0000000100)=""/108}, 0x18) 03:34:43 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0x7, 0x0, &(0x7f0000000100)='\x00\x00\x00?\x00\x00\x00', 0x0, 0x100, 0xf2ffffff}, 0x40) 03:34:43 executing program 3: r0 = socket$inet6(0xa, 0x100000000000003, 0x3c) pipe2(&(0x7f0000000200), 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40001ab, 0xfc00) 03:34:44 executing program 4: syz_emit_ethernet(0x4e, &(0x7f0000000400)={@broadcast, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "1491f9", 0x18, 0x0, 0x0, @empty, @remote, {[@srh={0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x7}], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "ef6fb3", 0x0, "ad27dc"}}}}}}}, 0x0) 03:34:44 executing program 1: modify_ldt$write2(0x11, &(0x7f0000000080)={0xe3a}, 0x10) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) clone(0x80000, 0x0, 0x0, 0x0, 0x0) 03:34:44 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:44 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6af9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) 03:34:44 executing program 4: openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\xa4h\x04\x00', 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) pread64(r1, &(0x7f0000000200)=""/39, 0xfdef, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0xfffffffffffffe5d, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b0000000000"], 0x28}}, 0x0) dup2(r0, r1) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x402c5828, &(0x7f0000000000)={0x580000, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x3800000]}) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x4) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000001b40)=[{{&(0x7f0000000640)={0xa, 0x4e22, 0xbca7, @local, 0x705}, 0x1c, &(0x7f00000008c0)=[{0x0}, {&(0x7f0000000700)="570b7a837dac496767b1d3695174e1b51d517b19f957cfe8e10f9eb29a284b920433e2a3a110388c9f021166e419a18e0d25467d91", 0x35}, {0x0}], 0x3}}], 0x1, 0x20044001) 03:34:44 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0x7, 0x0, &(0x7f0000000100)='\x00\x00\x00?\x00\x00\x00', 0x0, 0x100, 0xf2ffffff}, 0x40) 03:34:44 executing program 1: modify_ldt$write2(0x11, &(0x7f0000000080)={0xe3a}, 0x10) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) clone(0x80000, 0x0, 0x0, 0x0, 0x0) 03:34:44 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:44 executing program 3: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(0xffffffffffffffff, 0xc008ae05, &(0x7f00000001c0)=""/231) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x80000f, 0x4002011, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x0, @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r2 = open(0x0, 0x141042, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r5 = accept4(r3, 0x0, 0x0, 0x0) sendto$inet6(r5, &(0x7f00000000c0), 0xffffffeb, 0x13, 0x0, 0xfffffffffffffdf0) readv(r2, &(0x7f0000000040)=[{&(0x7f0000002480)=""/4096, 0x1000}], 0x1) ioctl$KDENABIO(r2, 0x4b36) ioctl$KVM_RUN(r1, 0xae80, 0x0) 03:34:44 executing program 1: modify_ldt$write2(0x11, &(0x7f0000000080)={0xe3a}, 0x10) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) clone(0x80000, 0x0, 0x0, 0x0, 0x0) 03:34:44 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000027c0)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3f7fffffff2f73451c0e17a606fe530cb7e18ad181867514fe60077d4dd90123d27e7cf43548ce85857ad4a77cb56e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48253f8dbe82e16cf0000000000000000000000000000790ae2fd45d54b107c8c247f195e32f17799d6707432ff48bc085763314166443ee72c74f3db890e1ff15a10d91f67e9a22a986e0e244bd117252e47ffda1a869db7e632df4de8572344b419c45c2170fe873692d8255170c16822bdffd313660489c4c953a548ea5480dae93c7e4920a050f7c4cad3d9e75762e06f2954a18bd8464853b36a696e6ee7f2a12b53ecc0a0d4abcb93afea2d32d086635cd6e8da81db762e3446128da56e49b095a052811a0aac9f7c8b4afd65e9351ca78586e9681379f1ede100000000001986978e87a7e61f65163cf8fbfc1ed498c583751798a90dd7be57d0a09478983a2cb5df5e33789054354c6375f343ab6e8838ff3d6e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0x7, 0x0, &(0x7f0000000100)='\x00\x00\x00?\x00\x00\x00', 0x0, 0x100, 0xf2ffffff}, 0x40) 03:34:44 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=']) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) [ 537.633340] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:34:44 executing program 5: mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chmod(0x0, 0x0) lstat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)) geteuid() open(&(0x7f0000000000)='./control\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000000300), 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000280)='veth0_to_bond\x00', 0x10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r2) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) 03:34:44 executing program 1: modify_ldt$write2(0x11, &(0x7f0000000080)={0xe3a}, 0x10) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) clone(0x80000, 0x0, 0x0, 0x0, 0x0) [ 537.710484] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:34:44 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xb, 0x0, &(0x7f0000000100)="0000003f0000007e5bc579", 0x0, 0x100, 0xf2ffffff}, 0x40) 03:34:44 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=']) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) [ 537.757627] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 537.858268] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:34:44 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xb, 0x0, &(0x7f0000000100)="0000003f0000007e5bc579", 0x0, 0x100, 0xf2ffffff}, 0x40) 03:34:44 executing program 1: modify_ldt$write2(0x11, &(0x7f0000000080)={0xe3a}, 0x10) clone(0x80000, 0x0, 0x0, 0x0, 0x0) 03:34:44 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=']) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:44 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) statx(0xffffffffffffffff, 0x0, 0x2323d1b756738faa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='fdinfo/4\x00') preadv(r1, &(0x7f0000000380)=[{&(0x7f0000000240)=""/123, 0x7b}], 0x1, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) preadv(r2, 0x0, 0x0, 0x0) mknodat(r2, 0x0, 0x560723bc44834fdb, 0xffffff00) keyctl$chown(0x4, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r3) creat(&(0x7f0000000140)='./file0\x00', 0x0) creat(0x0, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='fdinfo/4\x00') preadv(r5, &(0x7f0000000380)=[{&(0x7f0000000240)=""/123, 0x7b}], 0x1, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x0) ioctl$FS_IOC_MEASURE_VERITY(r6, 0xc0046686, &(0x7f0000000240)={0x0, 0xcb, "6a846897e579cfbd5a29ee02ebcc3692cc982b7c06ecc6dc3a5eeb0791eeb2c84fcf21c0c5c54f1cf00b247420f5e622150d1662c0af4ab0ea3c970cee93d1dc84657c84a2a97a1727fa302376a7d065e48adb4af6efc1512a698c1e94c2b50de0f3ce79c022336c428bb78daec927eb1af2f897366bd87d5be06f3e967da78743e8c5d98b2fd7d835ae183e58766b987a32b7e6b04ade705b7fce7a1b5c26197b9acb79219748ddd13f37474b5503d61f646b8702930bec9f88ee1b3195b05e84871164bd5395f8e7fa59"}) r7 = inotify_init() inotify_add_watch(r7, &(0x7f0000000100)='./file0\x00', 0xfe) inotify_init() rmdir(&(0x7f0000000200)='./file0\x00') 03:34:44 executing program 4: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x12c) symlinkat(&(0x7f0000000100)='./file0/file0\x00', r0, &(0x7f0000000140)='./file0\x00') getdents(r0, &(0x7f0000000300)=""/119, 0x77) 03:34:44 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000170600000ee60000bf050000000000001f650000000000006507000002000000270700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) [ 538.001701] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:34:44 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:44 executing program 1: clone(0x80000, 0x0, 0x0, 0x0, 0x0) 03:34:44 executing program 4: set_tid_address(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0xc8, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_OPERSTATE={0x8, 0x3}, @IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x50}}, 0x0) 03:34:44 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000027c0)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3f7fffffff2f73451c0e17a606fe530cb7e18ad181867514fe60077d4dd90123d27e7cf43548ce85857ad4a77cb56e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48253f8dbe82e16cf0000000000000000000000000000790ae2fd45d54b107c8c247f195e32f17799d6707432ff48bc085763314166443ee72c74f3db890e1ff15a10d91f67e9a22a986e0e244bd117252e47ffda1a869db7e632df4de8572344b419c45c2170fe873692d8255170c16822bdffd313660489c4c953a548ea5480dae93c7e4920a050f7c4cad3d9e75762e06f2954a18bd8464853b36a696e6ee7f2a12b53ecc0a0d4abcb93afea2d32d086635cd6e8da81db762e3446128da56e49b095a052811a0aac9f7c8b4afd65e9351ca78586e9681379f1ede100000000001986978e87a7e61f65163cf8fbfc1ed498c583751798a90dd7be57d0a09478983a2cb5df5e33789054354c6375f343ab6e8838ff3d6e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xb, 0x0, &(0x7f0000000100)="0000003f0000007e5bc579", 0x0, 0x100, 0xf2ffffff}, 0x40) 03:34:44 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000540)=""/204) lsetxattr(0x0, &(0x7f0000000180)=@known='trusted.overlay.opaque\x00', &(0x7f00000001c0)='em0\'\x00', 0x5, 0x2) write$char_usb(0xffffffffffffffff, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0x2, 0x0, {0x0, 0x0, 0x8001}}, 0xfffffffffffffeba) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000340)={0x0, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff07006706000002000000070600000ee60000bf2500000000000063350000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad32010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$netlink(0x10, 0x3, 0x4) setsockopt$packet_int(r1, 0x107, 0xe, &(0x7f0000000180)=0x1, 0x4) write(r2, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r3 = socket(0x2, 0x0, 0x0) dup3(r0, r3, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGDEV(r4, 0x80045432, &(0x7f00000000c0)) pipe(&(0x7f0000000000)) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) write$P9_RVERSION(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="1300400036ffff0180000006003950323030301a1ed9a9e03ad993210520b7a0ca8ba4a2ebfbb5f89ede54ddc0eb5df6"], 0x30) syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') 03:34:44 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) statx(0xffffffffffffffff, 0x0, 0x2323d1b756738faa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='fdinfo/4\x00') preadv(r1, &(0x7f0000000380)=[{&(0x7f0000000240)=""/123, 0x7b}], 0x1, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) preadv(r2, 0x0, 0x0, 0x0) mknodat(r2, 0x0, 0x560723bc44834fdb, 0xffffff00) keyctl$chown(0x4, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r3) creat(&(0x7f0000000140)='./file0\x00', 0x0) creat(0x0, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='fdinfo/4\x00') preadv(r5, &(0x7f0000000380)=[{&(0x7f0000000240)=""/123, 0x7b}], 0x1, 0x0) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x0) ioctl$FS_IOC_MEASURE_VERITY(r6, 0xc0046686, &(0x7f0000000240)={0x0, 0xcb, "6a846897e579cfbd5a29ee02ebcc3692cc982b7c06ecc6dc3a5eeb0791eeb2c84fcf21c0c5c54f1cf00b247420f5e622150d1662c0af4ab0ea3c970cee93d1dc84657c84a2a97a1727fa302376a7d065e48adb4af6efc1512a698c1e94c2b50de0f3ce79c022336c428bb78daec927eb1af2f897366bd87d5be06f3e967da78743e8c5d98b2fd7d835ae183e58766b987a32b7e6b04ade705b7fce7a1b5c26197b9acb79219748ddd13f37474b5503d61f646b8702930bec9f88ee1b3195b05e84871164bd5395f8e7fa59"}) r7 = inotify_init() inotify_add_watch(r7, &(0x7f0000000100)='./file0\x00', 0xfe) inotify_init() rmdir(&(0x7f0000000200)='./file0\x00') 03:34:44 executing program 1: clone(0x80000, 0x0, 0x0, 0x0, 0x0) 03:34:45 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:45 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xd, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795eca", 0x0, 0x100, 0xf2ffffff}, 0x40) 03:34:45 executing program 5: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$P9_RVERSION(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c0bf404c1351451134c9a3dc79a83ed7f821ae1323f59ca36dc530921c9e525add9b0677db6e6862acaa60d6eb0445bb79ec24f8fd83294f29d8352a587984b16"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000000)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000280)={0xa0, 0x0, 0x3}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000500)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 03:34:45 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:45 executing program 1: clone(0x80000, 0x0, 0x0, 0x0, 0x0) 03:34:45 executing program 3: setreuid(0x0, 0xee00) geteuid() lsetxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='security.capability\x00', &(0x7f0000000300), 0xc, 0x2) setreuid(0x0, 0x0) mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)) syz_open_dev$vcsa(0x0, 0x40000004bac3159, 0x40000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001300), &(0x7f0000001480)=0xffffffcc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000380)={0x90, 0x0, 0x2}, 0x90) r0 = open$dir(&(0x7f0000000740)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000700)='./file0\x00', 0x90002) sendfile(r0, r0, 0x0, 0x8800000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000000)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000000100)=0x366) setuid(r1) 03:34:45 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xd, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795eca", 0x0, 0x100, 0xf2ffffff}, 0x40) 03:34:45 executing program 4: futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x5, 0x0, 0x0, &(0x7f0000000100), 0x0) 03:34:45 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCETHTOOL(r0, 0x89b0, &(0x7f0000000000)={'syz_tun\x00', &(0x7f0000002fc0)=@ethtool_flash={0x37, 0x0, "4d72d184b89b201a1598ebd7406aed3a4b80a03a83f06aac89368d3d3d5589ea93ed3f9cadf9db4e17d407e039b09de7733fbd79cde104fe6872b283e23e82b5db4536e7a9769b614d9d5a35b9dea07dedc23bfceaa48f8cf32a4cb8adaf39968e051eb0eaba8cc635ebea9ba67e35c316483b1ea1a92159657fde4558000fd0"}}) 03:34:45 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:45 executing program 1: modify_ldt$write2(0x11, 0x0, 0x0) clone(0x80000, 0x0, 0x0, 0x0, 0x0) [ 538.546837] audit: type=1800 audit(2000000085.240:224): pid=19218 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="sda1" ino=17022 res=0 03:34:45 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xd, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795eca", 0x0, 0x100, 0xf2ffffff}, 0x40) 03:34:45 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:45 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0xa, &(0x7f00000000c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, 0x0, 0xfffffda8}]) 03:34:45 executing program 1: modify_ldt$write2(0x11, 0x0, 0x0) clone(0x80000, 0x0, 0x0, 0x0, 0x0) 03:34:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000180)=0x1, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001500add427323b470c45b4560a067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 538.755235] audit: type=1800 audit(2000000085.450:225): pid=19243 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="sda1" ino=17022 res=0 03:34:45 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:45 executing program 3: clone(0x8002100, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x8, 0x70, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) tee(r1, r0, 0x7f, 0xe) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, 0x0, &(0x7f0000000040)) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r3, 0x8995, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r4) ioctl$FICLONE(r4, 0x40049409, 0xffffffffffffffff) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, 0x0) 03:34:45 executing program 1: modify_ldt$write2(0x11, 0x0, 0x0) clone(0x80000, 0x0, 0x0, 0x0, 0x0) 03:34:45 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x0, 0xf2ffffff}, 0x40) 03:34:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000180)=0x1, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001500add427323b470c45b4560a067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 03:34:45 executing program 5: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40246608, 0x0) [ 538.918074] bond0: option active_slave: mode dependency failed, not supported in mode balance-rr(0) 03:34:45 executing program 1: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) clone(0x80000, 0x0, 0x0, 0x0, 0x0) 03:34:45 executing program 3: r0 = add_key$keyring(0x0, &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = openat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x0, 0x4c) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000000)={{{@in6=@loopback, @in=@loopback}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000000100)=0x10f) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@broadcast, @in=@multicast2}}, {{@in=@initdev}, 0x0, @in6=@remote}}, &(0x7f0000000280)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in6=@mcast2}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, 0x0) getsockopt$inet6_mreq(r2, 0x29, 0x14, 0x0, &(0x7f0000000980)) getpeername$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000a00)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000003780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0, 0x800) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000006fc0)={@loopback}, &(0x7f0000007000)=0xc) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000007080)) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f0000007500)={0x0, 0x0, &(0x7f00000074c0), 0x1, 0x0, 0x0, 0x4000}, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000340)) r4 = openat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x400, 0x4c) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000000)={{{@in6=@loopback, @in=@loopback}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@empty}, 0x0, @in6=@remote}}, 0x0) socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="200010003e3b000080000000000000000000000071e18f35cc234500766d3170e83720f7507cc4871498614a52a1344a5bb69cc834f89c40ae06e8", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x20}}, 0x0) socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x0, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="200000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="6de4125af9ff000412bddd2b"], 0x20}}, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000000740)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x83}, 0xc, &(0x7f0000000700)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x20000000) keyctl$instantiate_iov(0x14, r0, &(0x7f00000009c0)=[{&(0x7f0000000340)}, {&(0x7f0000000380)="1dc7a089e5b468ce1948adedbdee0c97fe03570c48ac35a8e16c02e9bb02c634a17ee64c3a1cfcf36ba5b098490e4397fea1b168bf195505b2a6b49ce6d63351ab5e646d53036374cd473ea752d82102d221523ad1a1c2c3915155f850", 0x5d}, {&(0x7f0000000440)}, {&(0x7f0000000480)}, {&(0x7f00000006c0)}, {0x0}], 0x6, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r8, 0x5402, &(0x7f0000000040)={0xffffffffffffffff, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x58fffffe, 0x3}) r9 = syz_open_pts(r8, 0x88d82) write(r9, &(0x7f0000000380)="e313ed3d4b4aea617c1c4122a833ce3ce4877c10995c0738ea7a2a007085692e9defa90aeb7cabf14ae79b84e2a925ba7f6352bd25a90e1529d3f57edbe9eab01acf24", 0xa2ff821e) 03:34:45 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x0, 0xf2ffffff}, 0x40) 03:34:45 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grou', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:45 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x4000, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x40000, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r0, 0x0, 0xfffffffffffffed4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000240)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) pread64(r2, &(0x7f0000000200)=""/39, 0x27, 0x5) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe5d, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b0000000000"], 0x28}}, 0x0) dup2(r1, r2) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x402c5828, &(0x7f0000000000)={0x580000, 0x2ff870000, 0x1001000200000000, 0x0, 0x0, 0x0, [0x0, 0x3800000]}) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2271, &(0x7f0000000080)) 03:34:45 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) chdir(&(0x7f0000000300)='./file0\x00') symlink(&(0x7f0000000140)='..', &(0x7f00000000c0)='./file0\x00') chroot(&(0x7f0000000180)='./file0/file0\x00') mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x2841806, 0x0) unshare(0x40020000) umount2(&(0x7f0000000080)='./file0/file0/file0\x00', 0x0) 03:34:45 executing program 1: modify_ldt$write2(0x11, &(0x7f0000000080), 0x10) clone(0x0, 0x0, 0x0, 0x0, 0x0) 03:34:45 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x0, 0xf2ffffff}, 0x40) 03:34:45 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grou', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) [ 539.201893] IPVS: ftp: loaded support on port[0] = 21 03:34:45 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TCGETA(r0, 0x541a, &(0x7f0000000080)) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) 03:34:45 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0}, 0x40) [ 539.264483] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:34:46 executing program 1: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007ff, 0x0, 0x0) clock_gettime(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLOCK(0xffffffffffffffff, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000040)="0800b5055e0bcf") mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2b7069647320412c5ec7b5d90762f8ba9fe8ee7e083311af7cb115b708409b4e3fa972722ab7c89206bb6f6aee370fb8e7572bcd829a59c0e4e9af796410d43ec8818253da71fa1b6b4ed383c004ca276a75e6c87304b63b98dab37664c98904cb9639bf4b91d78f4ce4a35762ba803bb0aa07717d5c3e909d253ce3ef52d352ed9e0518d43a170ea8f70daf282682ea5e5a29ae1266f169f0dcd24a3d11c633af74dd3ac2ac46fd62ad075e989e5ab6f14a1d6e8f0d35ea51e18be5672af0b7f39f7497"], 0xc4) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4e", 0x3b, 0x11, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setreuid(r3, 0x0) 03:34:46 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grou', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) [ 539.314308] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:34:46 executing program 3: r0 = epoll_create1(0x0) fcntl$lock(r0, 0x7, &(0x7f0000000000)={0x1}) r1 = getpgid(0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x32) ioctl$KDSKBMETA(r2, 0x4b63, &(0x7f0000000300)=0x41b) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6(0xa, 0xffffffffffffffff, 0x1) ioctl(r3, 0x8912, &(0x7f0000001240)="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") r6 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = fcntl$getown(r6, 0x9) perf_event_open(0x0, r7, 0xb, r6, 0x0) ptrace$pokeuser(0x6, r7, 0x6, 0x4) r8 = creat(&(0x7f0000000180)='./bus\x00', 0x40) write$binfmt_elf64(r8, &(0x7f0000000800)=ANY=[@ANYPTR=&(0x7f0000000140)=ANY=[@ANYRESHEX, @ANYPTR=&(0x7f0000000480)=ANY=[@ANYPTR64, @ANYRES64=r3, @ANYRES64=r4, @ANYRES16, @ANYRESOCT=r5, @ANYRESOCT=r2, @ANYRES16=r8]], @ANYPTR64=&(0x7f0000001440)=ANY=[@ANYBLOB="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", @ANYRES64=r2, @ANYBLOB="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", @ANYRESDEC=r5, @ANYRES64=r5, @ANYRES32=r8, @ANYRES64=r4, @ANYRES32=r2], @ANYPTR64=&(0x7f0000000540)=ANY=[@ANYRESDEC], @ANYRES32=r2], 0x18) ioctl$PIO_UNISCRNMAP(r8, 0x4b6a, &(0x7f0000000fc0)="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") fcntl$setownex(r8, 0xf, &(0x7f0000000100)={0x2}) ioctl$sock_inet6_tcp_SIOCOUTQ(r8, 0x5411, &(0x7f0000000080)) r9 = socket$inet6(0xa, 0x3, 0x6) r10 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_MCAST_MSFILTER(r10, 0x29, 0x30, &(0x7f0000000300)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @remote}}}}, 0x8c) setsockopt$inet6_MCAST_JOIN_GROUP(r10, 0x29, 0x2a, &(0x7f0000000380)={0x7, {{0xa, 0x4e20, 0x401, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}}, 0x84) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r9, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x800, 0x0, 0x3, 0x1, 0x0, 0x10001}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r9, 0x29, 0x20, &(0x7f0000000000)={@local, 0x0, 0x0, 0xfe, 0x3}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r9, 0x29, 0x20, &(0x7f0000000040)={@dev={0xfe, 0x80, [], 0x28}, 0x0, 0x1000000000, 0x1, 0x3, 0x3b9}, 0x20) connect$inet6(r9, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) r11 = syz_open_procfs(0x0, &(0x7f00000009c0)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd0\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7\x95\xaeV\x0f\x9e\xed\x13\xc6H\v\xb7\xd0g!`\x18\x0f\x99\xadD-\xc8{\xbc\xb2\xb9Y\xe2P\x9b\xec\x1e_\xb4\x01\xf1\x1e\xa8\xf8\xdf?#p-\xbd3\"L\xe5\x7f\nC\x00}\x0eb\xbc\xa4}\x93\x9a\t\xf4\xfa\xbew D\x00\xb0Z\xc0\x1a\xf9\x924\a\x1c4\xfa\xe4\xe2\x8e\xe8\x19\x00\x05\xb7\xd51)\b\xf2#[-\xbf\x7f\x10\x14vy\x86\x85\xa4W\r\xe8i\x95\xc9\xe6\xf8\a\xd8\xe2\xdf\xc8\x97\xa2\b{b\xca\x95u:\v\x97\b\r@g\x80\x8d_\x18y\xd1\x8d\xc1)U`\xb9\xe2\xd7\x88\xc2\xaf\xdc\xc1\xda\xcc\xca\x9a\v\xact8Z\x1c\x06\x1b\xdf\xb5\xc1\"\x05,Yw\vP\xcc\xfa\xf9\x9f<\xbd\x1c\x1a\xcb*\x06\xb7\xcd\x7f\xba\xadr\xbb/\"2p\xf8\b\x1e\x04\xac*\x88\xb0\xa7\xc6\xb4M\x97n\xdck\xd1\\\x9f\x9d\x1a4 Y\xac\xcb\xf9f\xcf>qd\vn:\x12\xc0\xdca\xfd\x8d\x9dL\x92\x17\x8fe\xd1\xaa$\x12\x02R\x96t?\x9a\x1a') fsetxattr$security_selinux(r11, &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:v4l_device_t:s0\x00', 0xffffff95, 0x3) ioctl$void(0xffffffffffffffff, 0x6002786d) sendfile(r9, r11, &(0x7f00000000c0)=0x202, 0x8) fcntl$lock(r11, 0xd, &(0x7f0000000140)={0x2, 0x0, 0x0, 0x2002001fffffd, r1}) 03:34:46 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0}, 0x40) 03:34:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xb) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x1f8, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) process_vm_readv(0x0, &(0x7f0000001280)=[{&(0x7f0000001180)=""/64, 0x40}, {&(0x7f00000011c0)=""/15, 0xf}, {0x0}], 0x3, &(0x7f0000001340)=[{&(0x7f00000012c0)=""/128, 0x80}], 0x1, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) r6 = openat(0xffffffffffffffff, &(0x7f0000001140)='./file0\x00', 0x8000, 0x144) getsockopt$inet6_buf(r6, 0x29, 0x6, &(0x7f00000014c0)=""/215, &(0x7f00000015c0)=0xd7) ioctl$KVM_NMI(r5, 0xae9a) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@local}}, &(0x7f0000000080)=0xe8) getgroups(0x3, &(0x7f0000000180)=[0xee00, 0xee01, 0xee00]) fchown(r4, r7, r8) socket$packet(0x11, 0x2, 0x300) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f0000000400)) write$binfmt_aout(r2, &(0x7f0000001600)=ANY=[@ANYBLOB="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"], 0x910) ioctl$KVM_RUN(r5, 0xae80, 0x900000000000000) r9 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r9, 0x1, 0x6, 0x0, 0x0) getsockopt$sock_buf(r9, 0x1, 0x3b, &(0x7f0000001380)=""/197, &(0x7f0000001480)=0xc5) openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x280000, 0x0) r10 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x4440, 0x0) ioctl$SG_NEXT_CMD_LEN(r10, 0x2283, &(0x7f0000000100)=0x79) write$binfmt_elf64(r0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x4ef) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000000)={0xfff, {{0x2, 0x4e23, @remote}}}, 0x84) [ 539.591631] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 539.606767] IPVS: ftp: loaded support on port[0] = 21 03:34:46 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x4000, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x40000, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r0, 0x0, 0xfffffffffffffed4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000240)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) pread64(r2, &(0x7f0000000200)=""/39, 0x27, 0x5) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe5d, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b0000000000"], 0x28}}, 0x0) dup2(r1, r2) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x402c5828, &(0x7f0000000000)={0x580000, 0x2ff870000, 0x1001000200000000, 0x0, 0x0, 0x0, [0x0, 0x3800000]}) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2271, &(0x7f0000000080)) 03:34:46 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) chdir(&(0x7f0000000300)='./file0\x00') symlink(&(0x7f0000000140)='..', &(0x7f00000000c0)='./file0\x00') chroot(&(0x7f0000000180)='./file0/file0\x00') mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x2841806, 0x0) unshare(0x40020000) umount2(&(0x7f0000000080)='./file0/file0/file0\x00', 0x0) 03:34:46 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0}, 0x40) 03:34:46 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_i', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:46 executing program 1: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x11, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}, @broadcast}, @gre={{0x0, 0x0, 0x1, 0x0, 0xb, 0x0, 0x0, 0x8, 0x8906, 0x8, 0x2}, {}, {}, {0x0, 0x57}}}}}}, 0x0) 03:34:46 executing program 3: r0 = epoll_create1(0x0) fcntl$lock(r0, 0x7, &(0x7f0000000000)={0x1}) r1 = getpgid(0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x32) ioctl$KDSKBMETA(r2, 0x4b63, &(0x7f0000000300)=0x41b) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6(0xa, 0xffffffffffffffff, 0x1) ioctl(r3, 0x8912, &(0x7f0000001240)="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") r6 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = fcntl$getown(r6, 0x9) perf_event_open(0x0, r7, 0xb, r6, 0x0) ptrace$pokeuser(0x6, r7, 0x6, 0x4) r8 = creat(&(0x7f0000000180)='./bus\x00', 0x40) write$binfmt_elf64(r8, &(0x7f0000000800)=ANY=[@ANYPTR=&(0x7f0000000140)=ANY=[@ANYRESHEX, @ANYPTR=&(0x7f0000000480)=ANY=[@ANYPTR64, @ANYRES64=r3, @ANYRES64=r4, @ANYRES16, @ANYRESOCT=r5, @ANYRESOCT=r2, @ANYRES16=r8]], @ANYPTR64=&(0x7f0000001440)=ANY=[@ANYBLOB="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", @ANYRES64=r2, @ANYBLOB="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", @ANYRESDEC=r5, @ANYRES64=r5, @ANYRES32=r8, @ANYRES64=r4, @ANYRES32=r2], @ANYPTR64=&(0x7f0000000540)=ANY=[@ANYRESDEC], @ANYRES32=r2], 0x18) ioctl$PIO_UNISCRNMAP(r8, 0x4b6a, &(0x7f0000000fc0)="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") fcntl$setownex(r8, 0xf, &(0x7f0000000100)={0x2}) ioctl$sock_inet6_tcp_SIOCOUTQ(r8, 0x5411, &(0x7f0000000080)) r9 = socket$inet6(0xa, 0x3, 0x6) r10 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_MCAST_MSFILTER(r10, 0x29, 0x30, &(0x7f0000000300)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @remote}}}}, 0x8c) setsockopt$inet6_MCAST_JOIN_GROUP(r10, 0x29, 0x2a, &(0x7f0000000380)={0x7, {{0xa, 0x4e20, 0x401, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}}, 0x84) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r9, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x800, 0x0, 0x3, 0x1, 0x0, 0x10001}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r9, 0x29, 0x20, &(0x7f0000000000)={@local, 0x0, 0x0, 0xfe, 0x3}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r9, 0x29, 0x20, &(0x7f0000000040)={@dev={0xfe, 0x80, [], 0x28}, 0x0, 0x1000000000, 0x1, 0x3, 0x3b9}, 0x20) connect$inet6(r9, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) r11 = syz_open_procfs(0x0, &(0x7f00000009c0)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd0\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7\x95\xaeV\x0f\x9e\xed\x13\xc6H\v\xb7\xd0g!`\x18\x0f\x99\xadD-\xc8{\xbc\xb2\xb9Y\xe2P\x9b\xec\x1e_\xb4\x01\xf1\x1e\xa8\xf8\xdf?#p-\xbd3\"L\xe5\x7f\nC\x00}\x0eb\xbc\xa4}\x93\x9a\t\xf4\xfa\xbew D\x00\xb0Z\xc0\x1a\xf9\x924\a\x1c4\xfa\xe4\xe2\x8e\xe8\x19\x00\x05\xb7\xd51)\b\xf2#[-\xbf\x7f\x10\x14vy\x86\x85\xa4W\r\xe8i\x95\xc9\xe6\xf8\a\xd8\xe2\xdf\xc8\x97\xa2\b{b\xca\x95u:\v\x97\b\r@g\x80\x8d_\x18y\xd1\x8d\xc1)U`\xb9\xe2\xd7\x88\xc2\xaf\xdc\xc1\xda\xcc\xca\x9a\v\xact8Z\x1c\x06\x1b\xdf\xb5\xc1\"\x05,Yw\vP\xcc\xfa\xf9\x9f<\xbd\x1c\x1a\xcb*\x06\xb7\xcd\x7f\xba\xadr\xbb/\"2p\xf8\b\x1e\x04\xac*\x88\xb0\xa7\xc6\xb4M\x97n\xdck\xd1\\\x9f\x9d\x1a4 Y\xac\xcb\xf9f\xcf>qd\vn:\x12\xc0\xdca\xfd\x8d\x9dL\x92\x17\x8fe\xd1\xaa$\x12\x02R\x96t?\x9a\x1a') fsetxattr$security_selinux(r11, &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:v4l_device_t:s0\x00', 0xffffff95, 0x3) ioctl$void(0xffffffffffffffff, 0x6002786d) sendfile(r9, r11, &(0x7f00000000c0)=0x202, 0x8) fcntl$lock(r11, 0xd, &(0x7f0000000140)={0x2, 0x0, 0x0, 0x2002001fffffd, r1}) 03:34:46 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_i', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:46 executing program 1: r0 = epoll_create1(0x0) fcntl$lock(r0, 0x7, &(0x7f0000000000)={0x1}) r1 = getpgid(0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x32) ioctl$KDSKBMETA(r2, 0x4b63, &(0x7f0000000300)=0x41b) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6(0xa, 0xffffffffffffffff, 0x1) ioctl(r3, 0x8912, &(0x7f0000001240)="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") r6 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = fcntl$getown(r6, 0x9) perf_event_open(0x0, r7, 0xb, r6, 0x0) ptrace$pokeuser(0x6, r7, 0x6, 0x4) r8 = creat(&(0x7f0000000180)='./bus\x00', 0x40) write$binfmt_elf64(r8, &(0x7f0000000800)=ANY=[@ANYPTR=&(0x7f0000000140)=ANY=[@ANYRESHEX, @ANYPTR=&(0x7f0000000480)=ANY=[@ANYPTR64, @ANYRES64=r3, @ANYRES64=r4, @ANYRES16, @ANYRESOCT=r5, @ANYRESOCT=r2, @ANYRES16=r8]], @ANYPTR64=&(0x7f0000001440)=ANY=[@ANYBLOB="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", @ANYRES64=r2, @ANYBLOB="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", @ANYRESDEC=r5, @ANYRES64=r5, @ANYRES32=r8, @ANYRES64=r4, @ANYRES32=r2], @ANYPTR64=&(0x7f0000000540)=ANY=[@ANYRESDEC], @ANYRES32=r2], 0x18) ioctl$PIO_UNISCRNMAP(r8, 0x4b6a, &(0x7f0000000fc0)="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") fcntl$setownex(r8, 0xf, &(0x7f0000000100)={0x2}) ioctl$sock_inet6_tcp_SIOCOUTQ(r8, 0x5411, &(0x7f0000000080)) r9 = socket$inet6(0xa, 0x3, 0x6) r10 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_MCAST_MSFILTER(r10, 0x29, 0x30, &(0x7f0000000300)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @remote}}}}, 0x8c) setsockopt$inet6_MCAST_JOIN_GROUP(r10, 0x29, 0x2a, &(0x7f0000000380)={0x7, {{0xa, 0x4e20, 0x401, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1ff}}}, 0x84) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r9, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x800, 0x0, 0x3, 0x1, 0x0, 0x10001}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r9, 0x29, 0x20, &(0x7f0000000000)={@local, 0x0, 0x0, 0xfe, 0x3}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r9, 0x29, 0x20, &(0x7f0000000040)={@dev={0xfe, 0x80, [], 0x28}, 0x0, 0x1000000000, 0x1, 0x3, 0x3b9}, 0x20) connect$inet6(r9, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) r11 = syz_open_procfs(0x0, &(0x7f00000009c0)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd0\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7\x95\xaeV\x0f\x9e\xed\x13\xc6H\v\xb7\xd0g!`\x18\x0f\x99\xadD-\xc8{\xbc\xb2\xb9Y\xe2P\x9b\xec\x1e_\xb4\x01\xf1\x1e\xa8\xf8\xdf?#p-\xbd3\"L\xe5\x7f\nC\x00}\x0eb\xbc\xa4}\x93\x9a\t\xf4\xfa\xbew D\x00\xb0Z\xc0\x1a\xf9\x924\a\x1c4\xfa\xe4\xe2\x8e\xe8\x19\x00\x05\xb7\xd51)\b\xf2#[-\xbf\x7f\x10\x14vy\x86\x85\xa4W\r\xe8i\x95\xc9\xe6\xf8\a\xd8\xe2\xdf\xc8\x97\xa2\b{b\xca\x95u:\v\x97\b\r@g\x80\x8d_\x18y\xd1\x8d\xc1)U`\xb9\xe2\xd7\x88\xc2\xaf\xdc\xc1\xda\xcc\xca\x9a\v\xact8Z\x1c\x06\x1b\xdf\xb5\xc1\"\x05,Yw\vP\xcc\xfa\xf9\x9f<\xbd\x1c\x1a\xcb*\x06\xb7\xcd\x7f\xba\xadr\xbb/\"2p\xf8\b\x1e\x04\xac*\x88\xb0\xa7\xc6\xb4M\x97n\xdck\xd1\\\x9f\x9d\x1a4 Y\xac\xcb\xf9f\xcf>qd\vn:\x12\xc0\xdca\xfd\x8d\x9dL\x92\x17\x8fe\xd1\xaa$\x12\x02R\x96t?\x9a\x1a') fsetxattr$security_selinux(r11, &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:v4l_device_t:s0\x00', 0xffffff95, 0x3) ioctl$void(0xffffffffffffffff, 0x6002786d) sendfile(r9, r11, &(0x7f00000000c0)=0x202, 0x8) fcntl$lock(r11, 0xd, &(0x7f0000000140)={0x2, 0x0, 0x0, 0x2002001fffffd, r1}) 03:34:46 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) [ 539.887078] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 539.910245] net_ratelimit: 34 callbacks suppressed [ 539.910251] protocol 88fb is buggy, dev hsr_slave_0 [ 539.920368] protocol 88fb is buggy, dev hsr_slave_1 [ 539.962749] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 03:34:46 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_i', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:46 executing program 3: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x4000, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x40000, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r0, 0x0, 0xfffffffffffffed4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000240)="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") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) pread64(r2, &(0x7f0000000200)=""/39, 0x27, 0x5) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe5d, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b0000000000"], 0x28}}, 0x0) dup2(r1, r2) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x402c5828, &(0x7f0000000000)={0x580000, 0x2ff870000, 0x1001000200000000, 0x0, 0x0, 0x0, [0x0, 0x3800000]}) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2271, &(0x7f0000000080)) 03:34:46 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) [ 540.070144] protocol 88fb is buggy, dev hsr_slave_0 [ 540.075303] protocol 88fb is buggy, dev hsr_slave_1 [ 540.150117] protocol 88fb is buggy, dev hsr_slave_0 [ 540.155312] protocol 88fb is buggy, dev hsr_slave_1 [ 540.275771] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 540.310126] protocol 88fb is buggy, dev hsr_slave_0 [ 540.315446] protocol 88fb is buggy, dev hsr_slave_1 [ 540.340272] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 03:34:47 executing program 5: r0 = socket(0x2000000011, 0x4000000000080002, 0x0) sendmmsg(r0, &(0x7f0000000100)=[{{&(0x7f0000000040)=@l2={0x1f, 0x3005865}, 0x80, 0x0}}, {{&(0x7f0000000040)=@nfc={0x27, 0x9}, 0x80, 0x0}}], 0x2, 0x0) 03:34:47 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) chdir(&(0x7f0000000300)='./file0\x00') symlink(&(0x7f0000000140)='..', &(0x7f00000000c0)='./file0\x00') chroot(&(0x7f0000000180)='./file0/file0\x00') mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x2841806, 0x0) unshare(0x40020000) umount2(&(0x7f0000000080)='./file0/file0/file0\x00', 0x0) 03:34:47 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:47 executing program 1: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x1a3d0, 0x54, 0x54000000, [], [{}, {0x801, 0x0, 0x80000001}]}) 03:34:47 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000027c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) 03:34:47 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000540)=0x1, 0x86, 0x0, &(0x7f00000005c0), 0x0, 0x0) 03:34:47 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(r0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) bind$inet6(0xffffffffffffffff, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @link_local}, 0x14) quotactl(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80047601, &(0x7f0000000040)) memfd_create(0x0, 0x0) signalfd(r6, &(0x7f0000000080)={0x4}, 0x8) shutdown(r4, 0x1) fallocate(0xffffffffffffffff, 0x100000000, 0x0, 0x0) 03:34:47 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) [ 540.797352] audit: type=1804 audit(2000000087.490:226): pid=19378 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir813624131/syzkaller.XCjG52/475/bus" dev="sda1" ino=17050 res=1 03:34:47 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x30000, 0x0) mount(&(0x7f0000000140)=@filename='./file0\x00', &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="2f6465762f6e62643000dd086a754db4af3215b08b195eaf8f47f71c4c7904db1d3394d6e52858c9a5432814e2ea3701e5b36cfe70fa6ebd00451e9bf2e579fded501ce3316a93462d7feefe2d5caabcef9bd090113649c2fa6ab4544e9fd7f0"], &(0x7f0000000280)='./file0\x00', &(0x7f0000000380)='cpuset\x00', 0x80000, &(0x7f00000003c0)='\x00') shmctl$SHM_LOCK(0x0, 0xb) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/54, 0xfffffffffffffe83) getgroups(0x3, &(0x7f00000004c0)=[0xffffffffffffffff, 0xee00, 0xee01]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000001680)=0xe8) mount$9p_fd(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x2000000, &(0x7f00000016c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@cache_loose='cache=loose'}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@version_9p2000='version=9p2000'}], [{@fowner_lt={'fowner<', r2}}]}}) wait4(0x0, 0x0, 0x80000000, 0x0) r3 = getpid() tkill(r3, 0x9) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000680)="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", 0xffe, 0xfffffffffffffffb) mount(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 03:34:47 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x21a, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x2c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_XDP={0x4}, @IFLA_GROUP={0x8}]}, 0x2c}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) creat(0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) pwrite64(r0, &(0x7f0000000080), 0x0, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f00000004c0), 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x2000, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000019c0)) [ 540.894162] audit: type=1804 audit(2000000087.490:227): pid=19378 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.1" name="/root/syzkaller-testdir813624131/syzkaller.XCjG52/475/bus" dev="sda1" ino=17050 res=1 [ 540.999500] audit: type=1804 audit(2000000087.500:228): pid=19378 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.1" name="/root/syzkaller-testdir813624131/syzkaller.XCjG52/475/bus" dev="sda1" ino=17050 res=1 [ 541.045412] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 541.053405] 9pnet: Insufficient options for proto=fd 03:34:47 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x161, 0x11, 0x6c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 03:34:47 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) [ 541.108664] audit: type=1804 audit(2000000087.500:229): pid=19378 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir813624131/syzkaller.XCjG52/475/bus" dev="sda1" ino=17050 res=1 [ 541.129905] 9pnet: Insufficient options for proto=fd 03:34:47 executing program 1: syz_emit_ethernet(0x63, &(0x7f0000000080)={@local, @empty=[0x4305], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x8, 0x2c, 0x0, @ipv4={[0x2, 0x2, 0x543, 0x88480000, 0xe80, 0xfd00, 0xe80, 0x200000000000000, 0x81000000], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x8848000000000000]}, {[], @icmpv6=@time_exceed={0x3a, 0x0, 0x0, 0x0, [0x7, 0x4, 0x1000000], {0x0, 0x7, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0x7ffff}}}}}}}}}, 0x0) [ 541.225234] audit: type=1804 audit(2000000087.510:230): pid=19378 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.1" name="/root/syzkaller-testdir813624131/syzkaller.XCjG52/475/bus" dev="sda1" ino=17050 res=1 03:34:48 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) chdir(&(0x7f0000000300)='./file0\x00') symlink(&(0x7f0000000140)='..', &(0x7f00000000c0)='./file0\x00') chroot(&(0x7f0000000180)='./file0/file0\x00') mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x2841806, 0x0) unshare(0x40020000) umount2(&(0x7f0000000080)='./file0/file0/file0\x00', 0x0) 03:34:48 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:48 executing program 5: r0 = memfd_create(&(0x7f0000000380)='keyringlo\x00\xf9\xe32\x10\xd4w\xf0\xfb\xca\x82\xbf\xc2K\x1c\x95\xaaPv\xben\x8b\xd7\xaf\fn\xdd\xf0\x18\'\"\xfe\xff+\x9a\x00\xce\xf0\xfbi\x84\xe5``\xde\xb0\x90\x81]\x9e\xf9\xfb\xc9\xfe\xbc\xd2e}\x98\x06_c\x0f\x14\xbc\xe0\xd3.,\x81\xa5\xbf4\xf6\x03D\xd5\xd1tU\xfd\x1b\x7f&`+t\xc3F<\x13\xbf\xbd\xc2c\xe8\xe6\xc0\xe4\xfd\xb0\xb3S\xd9n\x05\xf4\xaf\xda\xa5\xe9\xa21\x1e\v\x047\xb3\xd7yO\xd3>\xcc\x81\x1fm\xb8\x06\xdaT\xef+:\xc6l\xdbA\xbd\xb6B-8\x9e\xf5;\x01l\xb1\'\xcb\xae|ggX\xe1\x99u$\xeaoW\xfe\x8e1X\xa0\xb8\x939\xf5Mm\x86\xb3\xf1\xd5\xebN\x93.J\"\xb6\xda\r\x1d>\xaf\xf99\xd91 \x19\xfc\x98\x82\xc3{d\xcc?\xf3\xe0\x01(\x1cv#\xc8\x91\x16\xa7\xdd\x8a\xefj!\x10\xb5\xc8\"q}\x7f\x9d\x03\x01a(\xean\x95\xa6ok\xb4\x17X;\xf0\xddT\xd1\xcd\x01[0\xf2\x96\xd8\xf6\xe5\xeeC\x8b&|\xf4\x03\x9a\x90_j\x83\t\x92v\x96\xe6\xdc\xfb\xa6\x1b\x16\x10u\x85\xa2\xa1\x88\xba\x10\xeaWk\xd6\x99\xbc\x90x\xd3\xed\xec\xcf\xbd\xbf\xc5_C\xdd\x899\x9e\xd3XD\xe7{\xf9[\xa7\x9f\x17\xbb\x93\xbf\x85\xe1l\xf6*\x13\xb5,%\xc2R\xb7\xe4QO\x01\x1c\x9d\xa6\xb2\xcb\x7f\x19\b\xfeX\xceer\x16\xb2\xa5\x19\x0e\nrp\x99\xab\r\x83\xcc\xdd\xdb\xaag\x92\xf2\xbe\xbf\x9a\x8bqk=\xd8\x8d\x15\x90\xc1\xd4\xfc\xc1\xe8\x18\xdc\x822F\xd6\xd5\x9eD\x9f\xcf\xf4\x97\x0f\xf8\x88\xefc\xc1\'}v\xc8Y\xf6\xeb\xa0\x8c\x01=+\xba\ry\x18t\x03\xbf\xe4]\"\xa2\xb8\xdc\xb5\xffg\x9et\x81V\xc5{2e%os\x97\xf6\xc1\x8c\x91\"\xdb[\xdf\xb6pv\xee\x1a\x04\xdc\xcf\xd3&\x99\xaa\xd4q\x99\xbd\xe5\x05', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) r1 = socket$inet6(0xa, 0x40000000000001, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) 03:34:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f0000000140), 0x4) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) 03:34:48 executing program 1: syz_emit_ethernet(0x63, &(0x7f0000000080)={@local, @empty=[0x4305], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x8, 0x2c, 0x0, @ipv4={[0x2, 0x2, 0x543, 0x88480000, 0xe80, 0xfd00, 0xe80, 0x200000000000000, 0x81000000], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x8848000000000000]}, {[], @icmpv6=@time_exceed={0x3a, 0x0, 0x0, 0x0, [0x7, 0x4, 0x1000000], {0x0, 0x7, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0x7ffff}}}}}}}}}, 0x0) 03:34:48 executing program 0: ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000280)={0x0, {0x2, 0x0, @local}, {0x2, 0x0, @empty}}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0xff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = memfd_create(&(0x7f0000000040)='u', 0x0) r1 = dup(r0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f00000000c0)='\x00', 0x0, 0x0, 0x1000) ioctl$KVM_GET_API_VERSION(0xffffffffffffffff, 0xae00, 0x0) request_key(0x0, &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0) request_key(0x0, 0x0, &(0x7f0000002ac0)='./cgroup\x00', 0xfffffffffffffff8) keyctl$negate(0xd, 0x0, 0x0, 0x0) 03:34:48 executing program 1: syz_emit_ethernet(0x63, &(0x7f0000000080)={@local, @empty=[0x4305], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x8, 0x2c, 0x0, @ipv4={[0x2, 0x2, 0x543, 0x88480000, 0xe80, 0xfd00, 0xe80, 0x200000000000000, 0x81000000], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x8848000000000000]}, {[], @icmpv6=@time_exceed={0x3a, 0x0, 0x0, 0x0, [0x7, 0x4, 0x1000000], {0x0, 0x7, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0x7ffff}}}}}}}}}, 0x0) 03:34:48 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000200)="84", 0x1, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x0}, 0x0) 03:34:48 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:48 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f0000000180)=0x6f7bbbe1, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f00000056c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) 03:34:48 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = getpid() sched_setaffinity(r2, 0xffffff8b, &(0x7f0000000080)=0x9) creat(&(0x7f00000003c0)='./file0\x00', 0x0) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x0, 0x0) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) getuid() write(r1, &(0x7f00000001c0), 0xfffffef3) clock_gettime(0x0, &(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:34:48 executing program 1: syz_emit_ethernet(0x63, &(0x7f0000000080)={@local, @empty=[0x4305], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x8, 0x2c, 0x0, @ipv4={[0x2, 0x2, 0x543, 0x88480000, 0xe80, 0xfd00, 0xe80, 0x200000000000000, 0x81000000], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x8848000000000000]}, {[], @icmpv6=@time_exceed={0x3a, 0x0, 0x0, 0x0, [0x7, 0x4, 0x1000000], {0x0, 0x7, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0x7ffff}}}}}}}}}, 0x0) [ 541.977056] audit: type=1804 audit(2000000088.670:231): pid=19457 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir385344437/syzkaller.R5fd2c/19/file0" dev="sda1" ino=17043 res=1 [ 542.008368] audit: type=1804 audit(2000000088.670:232): pid=19457 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir385344437/syzkaller.R5fd2c/19/file0" dev="sda1" ino=17043 res=1 [ 542.541567] IPVS: ftp: loaded support on port[0] = 21 [ 542.759974] audit: type=1804 audit(2000000089.450:233): pid=19457 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.5" name="/root/syzkaller-testdir385344437/syzkaller.R5fd2c/19/file0" dev="sda1" ino=17043 res=1 03:34:50 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_PIT(r1, 0xae45, 0x0) 03:34:50 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:50 executing program 3: r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() clock_nanosleep(0x2, 0x0, &(0x7f00000005c0)={0x0, 0x989680}, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff7fffffffffffe}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) socket(0x10, 0x803, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004a40)=[{{0x0, 0x0, 0x0}}], 0x8000000000003b0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@empty, @in6=@ipv4={[], [], @broadcast}}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0x3b9) syz_genetlink_get_family_id$fou(&(0x7f0000000180)='fou\x00') sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0xc044) sendfile(r0, r1, 0x0, 0x4) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[], 0x0, 0xffffffffffffffff}) ioctl$KVM_RUN(r3, 0xae80, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000300)=0x7) 03:34:50 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) 03:34:50 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r0, &(0x7f0000000400)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, &(0x7f00000000c0)=0x80) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c460080000000000000000b000000000000003f8bca0000020038000000b59a1695ffffffff"], 0x28) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000140)={&(0x7f0000011000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000001000/0x2000)=nil, &(0x7f0000008000/0xa000)=nil, &(0x7f0000ff7000/0x1000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000000000/0x2000)=nil, &(0x7f0000fef000/0x11000)=nil, &(0x7f0000001000/0x1000)=nil, &(0x7f0000010000/0x3000)=nil, 0x0, 0x0, r1}, 0x68) prctl$PR_SET_MM(0x23, 0x8, &(0x7f000000c000/0x3000)=nil) 03:34:50 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x10000000002) 03:34:50 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:50 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) 03:34:50 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000008000)="4c0000001200ff3883cdcd9567a2830007a600800000000000000068354046002c001d0000000000000002003ab68211489ba5ff34cb5f3996f32314c7a4bb5dec30de33a49868c6282ca63d", 0x4c}], 0x1}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec16, 0x0) 03:34:50 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) [ 543.603920] *** Guest State *** 03:34:50 executing program 4: ftruncate(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000180)=0x20000000b, 0x11) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000002c0)=[{0x6}]}, 0x10) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$vcsa(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) 03:34:50 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) 03:34:50 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getgroups(0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000400)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}) ioctl$KVM_RUN(r2, 0xae80, 0x900000000000000) r3 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) lseek(r3, 0x0, 0x0) lseek(0xffffffffffffffff, 0x1003, 0x0) sendfile(r3, 0xffffffffffffffff, &(0x7f0000000580), 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x280000, 0x0) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000100)=0x79) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000000)={0xfff, {{0x2, 0x4e23, @remote}}}, 0x84) getresgid(0x0, &(0x7f00000005c0), 0x0) [ 543.626694] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 [ 543.679072] CR4: actual=0x0000000000002050, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 03:34:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000003a40)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) clock_gettime(0x0, 0x0) rt_sigprocmask(0x6, &(0x7f0000000000)={0x3}, &(0x7f0000000040), 0x8) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) io_setup(0xc6f3, &(0x7f00000002c0)) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) io_setup(0xc6f3, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000100)=[0x0]) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000000100)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x2}]) eventfd(0x8001) pipe2(&(0x7f0000000580), 0x4800) [ 543.724124] CR3 = 0x00000000fffbc000 [ 543.755457] RSP = 0x0000000000000000 RIP = 0x0000000000000000 [ 543.796544] RFLAGS=0xffffffffffffffff DR7 = 0x0000000000000400 [ 543.830376] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 543.838475] CS: sel=0xf000, attr=0x0009b, limit=0x0000ffff, base=0x00000000ffff0000 [ 543.912361] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 543.938575] SS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 543.985042] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 544.007553] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 544.027384] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 544.038634] GDTR: limit=0x0000ffff, base=0x0000000000000000 [ 544.053243] LDTR: sel=0x0000, attr=0x00082, limit=0x0000ffff, base=0x0000000000000000 [ 544.063662] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 544.075772] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 544.086167] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 544.097449] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 544.109222] Interruptibility = 00000000 ActivityState = 00000000 [ 544.124596] *** Host State *** [ 544.128535] RIP = 0xffffffff81174b00 RSP = 0xffff88805f177998 [ 544.136549] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 544.143182] FSBase=00007feb9e379700 GSBase=ffff8880aef00000 TRBase=fffffe0000034000 [ 544.152129] GDTBase=fffffe0000032000 IDTBase=fffffe0000000000 [ 544.158085] CR0=0000000080050033 CR3=0000000099ca1000 CR4=00000000001426e0 [ 544.165686] Sysenter RSP=fffffe0000033200 CS:RIP=0010:ffffffff862018e0 [ 544.172566] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 544.178630] *** Control State *** [ 544.182260] PinBased=0000003f CPUBased=b6a1edfe SecondaryExec=000000e3 [ 544.188999] EntryControls=0000d1ff ExitControls=002fefff [ 544.194653] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 544.204171] VMEntry: intr_info=80000000 errcode=00000000 ilen=00000000 [ 544.210950] VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 [ 544.217640] reason=80000021 qualification=0000000000000000 [ 544.224185] IDTVectoring: info=00000000 errcode=00000000 [ 544.229740] TSC Offset = 0xfffffeda62d3aa79 [ 544.234394] TPR Threshold = 0x00 [ 544.237775] EPT pointer = 0x00000000a71c801e [ 544.246138] Virtual processor ID = 0x0001 03:34:51 executing program 3: openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\xa4h\x04\x00', 0x43732e5398416f1a}) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) pread64(r1, &(0x7f0000000200)=""/39, 0xfdef, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0xfffffffffffffe5d, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b0000000000"], 0x28}}, 0x0) dup2(r0, r1) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x402c5828, &(0x7f0000000000)={0x580000, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x3800000]}) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x4) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000001b40)=[{{&(0x7f0000000640)={0xa, 0x4e22, 0xbca7, @local, 0x705}, 0x1c, &(0x7f00000008c0)=[{0x0}, {&(0x7f0000000700)="570b7a837dac496767b1d3695174e1b51d517b19f957cfe8e10f9eb29a284b920433e2a3a110388c9f021166e419a18e0d25467d91", 0x35}, {0x0}], 0x3}}], 0x1, 0x20044001) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) 03:34:51 executing program 1: syz_emit_ethernet(0x63, &(0x7f0000000080)={@local, @empty=[0x4305], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x8, 0x0, 0x0, @ipv4={[0x2, 0x2, 0x543, 0x88480000, 0xe80, 0xfd00, 0xe80, 0x200000000000000, 0x81000000], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x8848000000000000]}, {[], @icmpv6=@time_exceed={0x3a, 0x0, 0x0, 0x0, [0x7, 0x4, 0x1000000], {0x0, 0x7, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0x7ffff}}}}}}}}}, 0x0) 03:34:51 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:51 executing program 4: ftruncate(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000180)=0x20000000b, 0x11) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000002c0)=[{0x6}]}, 0x10) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$vcsa(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) 03:34:51 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setreuid(0x0, 0xee00) sendmmsg$sock(r0, &(0x7f0000002d00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@mark={{0x10}}], 0x10}}, {{&(0x7f0000000440)=@nfc={0x27, 0x2}, 0x80, &(0x7f0000002940)=[{&(0x7f00000004c0)='\\', 0x1000e}], 0x1, &(0x7f00000000c0)=[@mark={{0x10}}], 0x10}}], 0x2, 0x0) 03:34:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt(r0, 0x100000001, 0x9, 0x0, &(0x7f0000000140)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 03:34:51 executing program 1: syz_emit_ethernet(0x63, &(0x7f0000000080)={@local, @empty=[0x4305], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x8, 0x0, 0x0, @ipv4={[0x2, 0x2, 0x543, 0x88480000, 0xe80, 0xfd00, 0xe80, 0x200000000000000, 0x81000000], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x8848000000000000]}, {[], @icmpv6=@time_exceed={0x3a, 0x0, 0x0, 0x0, [0x7, 0x4, 0x1000000], {0x0, 0x7, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0x7ffff}}}}}}}}}, 0x0) 03:34:51 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:51 executing program 5: fchdir(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_PIT(0xffffffffffffffff, 0xc048ae65, 0x0) r0 = socket(0x10, 0x20000000803, 0x0) write(r0, &(0x7f0000000200)="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", 0xfc) 03:34:51 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100c0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x1000000, &(0x7f0000000240)=ANY=[@ANYBLOB='mode=00000000000000p00016671,mode=00000000000000000000011,mode=00000000000000000000007,mode=00000000000000000002123,mode=00000000000000000000003,mod']) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x20000500, 0x400000000000000, 0x0, 0x100032, 0x0) 03:34:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt(r0, 0x100000001, 0x9, 0x0, &(0x7f0000000140)) socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 03:34:51 executing program 1: syz_emit_ethernet(0x63, &(0x7f0000000080)={@local, @empty=[0x4305], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x8, 0x0, 0x0, @ipv4={[0x2, 0x2, 0x543, 0x88480000, 0xe80, 0xfd00, 0xe80, 0x200000000000000, 0x81000000], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x8848000000000000]}, {[], @icmpv6=@time_exceed={0x3a, 0x0, 0x0, 0x0, [0x7, 0x4, 0x1000000], {0x0, 0x7, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0x7ffff}}}}}}}}}, 0x0) [ 544.526072] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 544.650536] netlink: 176 bytes leftover after parsing attributes in process `syz-executor.5'. [ 544.801836] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:34:51 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x2c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="020043d05d25b666cd783f4b8e1c", 0x0, 0x8e}, 0x28) modify_ldt$read(0x0, &(0x7f0000000240)=""/153, 0x99) 03:34:51 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:51 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, "a031c2a4cdb90200000000000000c4ebf803000000314b0d081bcae24ad02e236d01bd56c62a54cc7bfd4ad9913e2f2b6f447da7afba00", "ca7b43cfe50b09a476d2e2c4bfd6ac63b08cd4144cb88abeba582dc0a71367dc57a23815f624081914c7ef067966df29d18a5750689cdf00", "81c7d45ce1dc72f0bb0a35d8194333e5cd543f10797db1079d5bc87f576edc84"}) 03:34:51 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000040)=@ethtool_sfeatures={0x3b, 0x2, [{0x10001, 0xfffffffffffff001}, {0x9}]}}) 03:34:51 executing program 3: openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\xa4h\x04\x00', 0x43732e5398416f1a}) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) pread64(r1, &(0x7f0000000200)=""/39, 0xfdef, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0xfffffffffffffe5d, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b0000000000"], 0x28}}, 0x0) dup2(r0, r1) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x402c5828, &(0x7f0000000000)={0x580000, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x3800000]}) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x4) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000001b40)=[{{&(0x7f0000000640)={0xa, 0x4e22, 0xbca7, @local, 0x705}, 0x1c, &(0x7f00000008c0)=[{0x0}, {&(0x7f0000000700)="570b7a837dac496767b1d3695174e1b51d517b19f957cfe8e10f9eb29a284b920433e2a3a110388c9f021166e419a18e0d25467d91", 0x35}, {0x0}], 0x3}}], 0x1, 0x20044001) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) 03:34:51 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f61050002008100fd03fe0504000800080006000400ff7e", 0x24}], 0x1}, 0x0) 03:34:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000100)='./file0/bus\x00', 0x0) mq_notify(r0, &(0x7f0000000040)) 03:34:51 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:51 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000040)=@ethtool_sfeatures={0x3b, 0x2, [{0x10001, 0xfffffffffffff001}, {0x9}]}}) 03:34:51 executing program 0: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) utime(0x0, &(0x7f00000001c0)) 03:34:51 executing program 4: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x44000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8020001) tkill(r0, 0x9) r1 = socket(0xa, 0x2400000001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000034000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}}, 0x200) getsockopt$inet6_buf(r1, 0x29, 0x10000000000030, &(0x7f0000034000)=""/144, &(0x7f0000e5f000)=0x90) 03:34:51 executing program 0: clone(0x1000003102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0xa, 0x2, 0x0) ioctl$sock_SIOCDELDLCI(r0, 0x8981, 0x0) syz_genetlink_get_family_id$net_dm(0x0) close(0xffffffffffffffff) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) 03:34:51 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000040)=@ethtool_sfeatures={0x3b, 0x2, [{0x10001, 0xfffffffffffff001}, {0x9}]}}) 03:34:51 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) [ 545.168954] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:34:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000100)='./file0/bus\x00', 0x0) mq_notify(r0, &(0x7f0000000040)) 03:34:51 executing program 0: socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff577, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x10, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000340)) r2 = open(&(0x7f0000002bc0)='./file0\x00', 0x40c2, 0x0) socket(0x10, 0x80002, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000001cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001d00)=0x14) lstat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r3 = syz_open_dev$vcsn(0x0, 0x0, 0x404001) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000bc0)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@dev, 0x4e20, 0xf7, 0x0, 0x0, 0x2, 0x80, 0xa0, 0x3b}, {0x4, 0x0, 0xae54, 0x0, 0x4, 0x9, 0x4, 0x401}, {0x7, 0x0, 0xff}, 0x0, 0x6e6bbc, 0x0, 0x1, 0x0, 0x2}, {{@in6=@rand_addr="6fb5573900", 0x4d4}, 0xa, @in6=@dev, 0x34ff, 0x0, 0x0, 0x0, 0x401, 0x9}}, 0xe8) write(r2, &(0x7f0000000600)='4', 0x4100) socket$packet(0x11, 0x3, 0x300) [ 545.220939] net_ratelimit: 30 callbacks suppressed [ 545.220944] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 545.270120] protocol 88fb is buggy, dev hsr_slave_0 [ 545.275233] protocol 88fb is buggy, dev hsr_slave_1 [ 545.280375] protocol 88fb is buggy, dev hsr_slave_0 [ 545.285440] protocol 88fb is buggy, dev hsr_slave_1 [ 545.339686] kauditd_printk_skb: 2 callbacks suppressed [ 545.339694] audit: type=1800 audit(2000000092.030:236): pid=19592 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=17062 res=0 [ 545.590177] protocol 88fb is buggy, dev hsr_slave_0 [ 545.595530] protocol 88fb is buggy, dev hsr_slave_1 03:34:52 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x10000, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/autofs\x00', 0x2, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000580)='/dev/autofs\x00', 0x204302, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x4000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x4001fc) getsockopt$sock_int(r0, 0x1, 0x1e, &(0x7f0000000000), &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r3, 0x406, r3) sendto$inet(r6, &(0x7f00000007c0)="d96e5401c4538a6e952055ad58e70c6ae63b2b42158aa062aee47761cde23c5ba2590be00aa913e6d00b219c67313f120e75c6b9c69bcff522b5b8115118e7cd90ba7d396737737a6cd3c1b169d4e66b32324426fc4141382206531a38042aed88236a60038a1c66e5d769cbae67a906599aded92af9875d11fc6348c44931d5636534372f59b0091b493cfc6776a7d7c8c693f684c24140b9aa586afb38e6bc7830cbe61728cfd07f8c631dbe0d821dca2000000000000000e43447c341cb285ae3dc16daadc02c30d37c152b7699c31536034310e2b7751ddbb32f03e50a146cda8bd985883eb3db01bbf2dfa95bc4a74436005703e728ac43f33fcb9d2ba6307034c247521dbbbeb59aa6c79d76a6f755e9f76e123cbda65faa59476147903b69be432f7fb520a19ccde0683538a1d652d6a8aa97245bec2bdd5e492f54b041886da0325160f34dd08992d136b20bd64f4b14d2415ee5665d67a8d63bf3bfe753d66c5a1935e3972679", 0x87, 0x4000000, &(0x7f0000000340)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xffffff1e) r7 = signalfd4(r4, &(0x7f00000003c0)={0x3f}, 0x8, 0x800) r8 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00'}) r9 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00'}) ioctl$sock_inet_udp_SIOCINQ(r9, 0x541b, &(0x7f00000006c0)) r10 = dup2(r5, r7) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x1000082) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000005c0)=0x0) r12 = syz_open_procfs(r11, &(0x7f0000001540)='net/udp\x00') ioctl$TIOCOUTQ(r12, 0x5411, &(0x7f0000001700)) r13 = socket$inet(0x2, 0x4000000000000001, 0x0) getgroups(0x2, &(0x7f0000000140)=[0xee00, 0xee01]) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)) r14 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(r14, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)={{0x0, 0x0, r15}}) r16 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(r16, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)={{0x0, 0x0, r17}}) r18 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(r18, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)={{0x0, 0x0, r19}}) getgroups(0x8, &(0x7f0000000640)=[r19, 0xffffffffffffffff, r17, 0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xffffffffffffffff]) getgid() getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000480)=0xc) ioctl$sock_netdev_private(r10, 0x89f5, &(0x7f00000004c0)="f7b9439bde73440b7fd3e0ebb3c346925919cb2d97ffd57f32b8954a03324b6c05bcb7b413278707fe1d3bee277b0371ed06440f290c7ee622af8f6bd3fbfcfcaaf9c8f5206e9dee4daf44bf44a33a3832c629073643f7077137befee8692168bbbd4fcdb4039e95dc56e886d1ec30a13ca2301ac34e14144f0a85") ioctl$LOOP_SET_FD(r6, 0x4c00, r7) bind$inet(r13, &(0x7f00000000c0)={0x2, 0x4e23, @rand_addr=0xef}, 0x10) ioctl$LOOP_SET_FD(r10, 0x4c00, r0) getpeername$packet(r10, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000015c0)=0x14) fcntl$F_SET_FILE_RW_HINT(r3, 0x40e, &(0x7f0000000040)=0x4) fsetxattr$trusted_overlay_opaque(r4, &(0x7f0000000400)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x1) sendto$inet(r13, 0x0, 0x0, 0x200007fd, &(0x7f00000001c0)={0x2, 0x4000000004e23}, 0x10) clone(0x2000000, 0x0, 0x0, 0x0, 0x0) socket$inet(0x2, 0xa, 0x7ffffffc) shutdown(r13, 0x40000000000001) ioctl$sock_inet_udp_SIOCINQ(r13, 0x541b, &(0x7f0000000100)) 03:34:52 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000040)=@ethtool_sfeatures={0x3b, 0x2, [{0x10001, 0xfffffffffffff001}, {0x9}]}}) 03:34:52 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:52 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x13, 0x3, &(0x7f0000000040)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x6f}}, &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x1db) 03:34:52 executing program 0: msgget(0x2, 0x40) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00', 0x8000, 0x87) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000940)={'veth0_to_bridge\x00', {0x2, 0x4e22, @empty}}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf73e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000500)=0xc) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x8, 0x0, 0x5, 0x10001, 0x0, 0x7, 0x2000, 0x1, 0x6, 0x4, 0x2, 0x7, 0xf87, 0x6, 0x1000, 0x5, 0x7fffffff, 0x5, 0xff, 0x3, 0xfff, 0x97f, 0x0, 0x80000001, 0x4, 0xffffffffffff8ac7, 0x51e, 0x5, 0x8, 0x5, 0x6, 0x100, 0x8, 0x5, 0x6, 0x200, 0x0, 0xf8, 0x2, @perf_bp={&(0x7f0000000200)}, 0x8, 0x5, 0xfff, 0x0, 0x9, 0x8, 0x3}, r1, 0xd, 0xffffffffffffffff, 0xe) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioprio_set$pid(0x2, 0x0, 0x7e39) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000003c0)="774963bb", 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x2000000000000004, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x9, [], 0x0, 0xffffffffffffffff, 0x0, 0x100000}, 0x3c) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r2, 0x4008ae48, &(0x7f00000004c0)) openat$cuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/cuse\x00', 0x2, 0x0) r3 = getpid() sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000040)={&(0x7f0000000740)=ANY=[@ANYBLOB="d8010000", @ANYRES16=0x0, @ANYBLOB="08002bbd7000fcdbdf250d0000001c0002000800020001000100080001000a00000004000400040004002800060004ecb4f5bc4e000200040002000400020008000100ff0f000008000100810000000800010000000000180007000c00030001000080000000000800020008000000e40004000c00010073797a300000000054000700080004000800000008000200ffffff7f08000200080000000800030015000000080004000300000008000400030000000800010007000000080003000000000008000300ac00000008000200000200004c00070008000200010000000800020009000000080004000200000008000100170000000800030000020000080001001e00000008000200ff030000080001000d0000000800030004000000040007002400070008000200050002000800040009000000080003000400000008000300ff0700000c00010073797a3000000000480807000c000400ff7f00000000000008000100ffff000008000100010400000c000300060000000000000008000200f7ffffff0c000300ffff000000000000080001000a0000003c00090008000200ff420000080002004c050000080002008a01000008000200bd0f000008000200080000000800020007000000"], 0x3}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) rt_tgsigqueueinfo(r3, r3, 0x80000000016, &(0x7f0000000100)) ptrace(0x10, r3) ptrace$getregset(0x4204, r3, 0x2, &(0x7f0000000080)={0x0}) ptrace$setregs(0xd, 0x0, 0xb041, &(0x7f00000002c0)="9e8def5332be7bd8249f6780a029b728a2b50740d16bb16fcc216aeefbe6c4bd36ab725ef57de3d6468fbec72b0b37c2c1415cbe4905c41013e3189002c93975be2db52fb2e8afa9d62be4d0b59d63c615522a3eeeb259c35d386db10b96b9f19021618e4582a0c2cf9917d8b3f06c4708aa68d42a4d059059e11461d9b651f82d13a09b20fcdf03f9939faa2e2f66ef96fd54622ef76f4c7b87830704d20adbe8027637d44c490d9104e8f9294943c35f15d249bc5ed86776b80eae3fdafbe493156f78b2ee7a110527") prctl$PR_SVE_SET_VL(0x32, 0x21984) msgget(0x0, 0x200) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000001c0)={'nlmon0\x00', 0x10000008000002}) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000000600)=""/175) 03:34:52 executing program 5: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) write$FUSE_INIT(r0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) pipe2(0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 03:34:52 executing program 0: getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) stat(0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000001c0)) keyctl$get_keyring_id(0x0, 0x0, 0x0) 03:34:52 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:52 executing program 1: ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000040)=@ethtool_sfeatures={0x3b, 0x2, [{0x10001, 0xfffffffffffff001}, {0x9}]}}) 03:34:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getegid() setresgid(0x0, r2, 0x0) fchown(r0, r1, r2) syz_open_dev$vcsn(0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) io_submit(0x0, 0x2, &(0x7f00000019c0)=[0x0, 0x0]) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000003, 0x31, 0xffffffffffffffff, 0x0) utimes(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)={{}, {0x77359400}}) r3 = perf_event_open(&(0x7f000001d000)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r4, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r4, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r4, r5) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) r6 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r6, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r6, 0x0) dup2(r6, 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000000)='./bus\x00', 0x0) [ 545.990712] autofs4:pid:19609:autofs4_fill_super: called with bogus options [ 545.994446] autofs4:pid:19617:autofs4_fill_super: called with bogus options 03:34:52 executing program 5: syz_emit_ethernet(0x66, &(0x7f0000000100)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0xffffff3a, 0xf0ffff, @ipv4={[0x3580], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 03:34:52 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b7020000f7ffffffbfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e342b66b249b35e029184e290b39a6f2fc2a5e019bd9690000f002cf57bf887e0243c1145b8a34e6bdc4dc1af6d3c6958da4bddac602e0502aec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8f61e1574f21a5f03dff2c779bf342055ea309c9c7c6607b5a9004d5271b41be073657d3d439e8134c0f9413e0c53fbec2f1add5694dfc3fc201c6b1c22876921d414cfa9270d556a033d0cea20eb522fce4f95d9d21f5f8d9a863314835e8cc7f34f9cc41d25f2299fbae4492b8bd580e61b7bc945255bd8cbf9aaaf7f0d16f78b490cf3007ca"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_SET_IRQCHIP(r2, 0xc208ae62, &(0x7f0000000300)={0x2}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x3b2, 0x0) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0xd, 0x2, {{0x20, 0x1, 0x6}, 0xffff}}, 0x18) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, r4, 0x0) listen(0xffffffffffffffff, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x46007a9c5a0bd5c3, &(0x7f000031e000)={0xa, 0xffbffffffffffffd, 0x0, @empty}, 0x31) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000100)=0x8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x6a2ad0f6184ddb1f, &(0x7f0000000180)={'veth0_to_bond\x00', @ifru_ivalue=0x1}}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r6, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x02\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=0x0}}) quotactl(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x100000000, 0x0, 0x0) llistxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=""/99, 0x63) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffc) 03:34:52 executing program 1: ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000040)=@ethtool_sfeatures={0x3b, 0x2, [{0x10001, 0xfffffffffffff001}, {0x9}]}}) 03:34:52 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=0000000000000000004000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) [ 546.141771] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 546.150123] protocol 88fb is buggy, dev hsr_slave_0 [ 546.155228] protocol 88fb is buggy, dev hsr_slave_1 03:34:52 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000040)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000080)) r2 = creat(0x0, 0x20005f) write$binfmt_elf32(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c4600800000000000000000000002000600ca3f8bca0000000038000000f700b50000000100000000000000"], 0x2e) ioctl$EVIOCRMFF(r2, 0x40044581, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000002c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) write$tun(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x54, 0x0, [], [{0x0, 0x0, 0xf00000000000000}, {0x801, 0x0, 0x80000001}]}) semget(0x0, 0x0, 0x104) [ 546.225746] bond0: Releasing backup interface bond_slave_1 03:34:53 executing program 1: ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000040)=@ethtool_sfeatures={0x3b, 0x2, [{0x10001, 0xfffffffffffff001}, {0x9}]}}) 03:34:53 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=0000000000000000004000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:53 executing program 0: getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) stat(0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000001c0)) keyctl$get_keyring_id(0x0, 0x0, 0x0) [ 546.311289] protocol 88fb is buggy, dev hsr_slave_0 03:34:53 executing program 4: socket$inet(0x2, 0x4000000000000001, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030000000003030303030303030303034303030302c75734572ff01", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, 0x0, 0x0, 0x0) mknod$loop(0x0, 0x0, 0xffffffffffffffff) statfs(&(0x7f0000000180)='./file0/file1\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000140)={'bond0\x00', 0x200}) mkdirat(r1, &(0x7f0000000180)='./file1\x00', 0x0) unlinkat(r1, &(0x7f0000000300)='./file1\x00', 0x200) socket$nl_route(0x10, 0x3, 0x0) 03:34:53 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000040)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000080)) r2 = creat(0x0, 0x20005f) write$binfmt_elf32(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c4600800000000000000000000002000600ca3f8bca0000000038000000f700b50000000100000000000000"], 0x2e) ioctl$EVIOCRMFF(r2, 0x40044581, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000002c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) write$tun(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x54, 0x0, [], [{0x0, 0x0, 0xf00000000000000}, {0x801, 0x0, 0x80000001}]}) semget(0x0, 0x0, 0x104) 03:34:53 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000040)=@ethtool_sfeatures={0x3b, 0x2, [{0x10001, 0xfffffffffffff001}, {0x9}]}}) 03:34:53 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=0000000000000000004000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) [ 546.437632] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 546.512001] bond0: Releasing backup interface bond_slave_1 03:34:53 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_SET_IRQCHIP(r2, 0xc208ae62, &(0x7f0000000300)={0x2}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x3b2, 0x0) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0xd, 0x2, {{0x20, 0x1, 0x6}, 0xffff}}, 0x18) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, r4, 0x0) listen(0xffffffffffffffff, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x46007a9c5a0bd5c3, &(0x7f000031e000)={0xa, 0xffbffffffffffffd, 0x0, @empty}, 0x31) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000100)=0x8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x6a2ad0f6184ddb1f, &(0x7f0000000180)={'veth0_to_bond\x00', @ifru_ivalue=0x1}}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r6, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x02\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=0x0}}) quotactl(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x100000000, 0x0, 0x0) llistxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=""/99, 0x63) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffc) 03:34:53 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,use', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100001c9, 0x0) sched_setattr(0xffffffffffffffff, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x7e9d}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='comm\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001e2, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) 03:34:53 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000040)=@ethtool_sfeatures={0x3b, 0x2, [{0x10001, 0xfffffffffffff001}, {0x9}]}}) 03:34:53 executing program 4: socket$inet(0x2, 0x4000000000000001, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030000000003030303030303030303034303030302c75734572ff01", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, 0x0, 0x0, 0x0) mknod$loop(0x0, 0x0, 0xffffffffffffffff) statfs(&(0x7f0000000180)='./file0/file1\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000140)={'bond0\x00', 0x200}) mkdirat(r1, &(0x7f0000000180)='./file1\x00', 0x0) unlinkat(r1, &(0x7f0000000300)='./file1\x00', 0x200) socket$nl_route(0x10, 0x3, 0x0) 03:34:53 executing program 5: socket$inet(0x2, 0x4000000000000001, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030000000003030303030303030303034303030302c75734572ff01", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, 0x0, 0x0, 0x0) mknod$loop(0x0, 0x0, 0xffffffffffffffff) statfs(&(0x7f0000000180)='./file0/file1\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000140)={'bond0\x00', 0x200}) mkdirat(r1, &(0x7f0000000180)='./file1\x00', 0x0) unlinkat(r1, &(0x7f0000000300)='./file1\x00', 0x200) socket$nl_route(0x10, 0x3, 0x0) 03:34:53 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,use', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:53 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x200000, 0x0, 0x12, r0, 0x0) 03:34:53 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000040)=@ethtool_sfeatures={0x3b, 0x2, [{0x10001, 0xfffffffffffff001}, {0x9}]}}) 03:34:53 executing program 0: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x17f) write(r0, &(0x7f0000000100)="1c0000004a005f0c14f9f407000904000a0000000096470000000000", 0x1c) 03:34:53 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f00000000c0)={0x7a, 0x0, [0x0, 0x0, 0x12], [0x3a]}) 03:34:53 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,use', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:53 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_SET_IRQCHIP(r2, 0xc208ae62, &(0x7f0000000300)={0x2}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x3b2, 0x0) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0xd, 0x2, {{0x20, 0x1, 0x6}, 0xffff}}, 0x18) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, r4, 0x0) listen(0xffffffffffffffff, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x46007a9c5a0bd5c3, &(0x7f000031e000)={0xa, 0xffbffffffffffffd, 0x0, @empty}, 0x31) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000100)=0x8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x6a2ad0f6184ddb1f, &(0x7f0000000180)={'veth0_to_bond\x00', @ifru_ivalue=0x1}}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r6, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x02\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=0x0}}) quotactl(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x100000000, 0x0, 0x0) llistxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=""/99, 0x63) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffc) 03:34:53 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x3c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xd, 0x24, 0x4, 0x1, 0x0, r0}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0xfffffffffffffe4e, 0x0}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f0000000040), &(0x7f0000000080), 0x10}, 0x20) 03:34:53 executing program 1: socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000040)=@ethtool_sfeatures={0x3b, 0x2, [{0x10001, 0xfffffffffffff001}, {0x9}]}}) 03:34:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e22, 0xf00, @mcast1}, {0xa, 0x0, 0x0, @remote}, 0x0, [0x0, 0x0, 0x5, 0x1ff, 0x5, 0x0, 0x15ba]}, 0x5c) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f0000000000)=@dstopts, 0x8) 03:34:53 executing program 1: socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000040)=@ethtool_sfeatures={0x3b, 0x2, [{0x10001, 0xfffffffffffff001}, {0x9}]}}) 03:34:53 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_i', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:53 executing program 1: socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000040)=@ethtool_sfeatures={0x3b, 0x2, [{0x10001, 0xfffffffffffff001}, {0x9}]}}) 03:34:53 executing program 0: unshare(0x8000400) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000005c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) 03:34:53 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_i', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:53 executing program 5: semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000000)=""/213) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB="757365722e68add7dcd744a7f9068bc3257cd04d66cd63d6257fc78dd43cfe91d43206ad03c0e83a101b53d59f18bf24c5b47e6882ff92ecb67605100c4c0760063f0ea51616143e09e3db4ea468"], 0x0, 0x0, 0x0) listxattr(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 03:34:54 executing program 4: creat(&(0x7f0000000700)='./bus\x00', 0x0) mount(&(0x7f00000001c0)=@md0='/dev/md0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='vfat\x00', 0x0, 0x0) 03:34:54 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) 03:34:54 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_SET_IRQCHIP(r2, 0xc208ae62, &(0x7f0000000300)={0x2}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x3b2, 0x0) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0xd, 0x2, {{0x20, 0x1, 0x6}, 0xffff}}, 0x18) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, r4, 0x0) listen(0xffffffffffffffff, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x46007a9c5a0bd5c3, &(0x7f000031e000)={0xa, 0xffbffffffffffffd, 0x0, @empty}, 0x31) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000100)=0x8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x6a2ad0f6184ddb1f, &(0x7f0000000180)={'veth0_to_bond\x00', @ifru_ivalue=0x1}}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r6, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x02\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=0x0}}) quotactl(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x100000000, 0x0, 0x0) llistxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=""/99, 0x63) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffc) 03:34:54 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000000)="8907040400", 0x5) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='syz_tun\x00', 0x10) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x16, &(0x7f0000000040), 0x4) 03:34:54 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) [ 547.400573] FAT-fs (md0): unable to read boot sector 03:34:54 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_i', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:54 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r0, 0x0, 0x6, 0x0, &(0x7f0000000080)) 03:34:54 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6af3b660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0xfffffffffffffffb}], 0x1, 0x0, 0x0, 0xfffffffffffffe3b) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) syz_open_procfs(0x0, &(0x7f0000000100)='nat/s.mp6\x00') ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000300)={0x1, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) pipe(&(0x7f0000000240)) ioctl$KVM_GET_REG_LIST(r2, 0xc008aeb0, &(0x7f0000000540)={0x5, [0x7, 0x4, 0xf1, 0x7, 0xfffffffffffff76d]}) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x200]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000100)=0x8, 0x4) ioctl$KVM_RUN(r3, 0xae80, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000004c0), &(0x7f0000000500)=0x4) getpgrp(0xffffffffffffffff) sched_setscheduler(0x0, 0x0, &(0x7f00000002c0)) ioctl$KVM_RUN(r3, 0xae80, 0x0) sigaltstack(&(0x7f0000001000/0x4000)=nil, 0x0) sigaltstack(&(0x7f0000001000/0x1000)=nil, 0x0) 03:34:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x880}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x9, 0xb, 0x6, 0xc}, 0x3c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000380)="1934c259e95977a8ee32"}, 0x20) 03:34:54 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:54 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) 03:34:54 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000140)=0xf3ad9b7184ccec4e, 0x4) [ 547.633677] kvm: pic: non byte read 03:34:54 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x303, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) open(&(0x7f0000002bc0)='./file0\x00', 0x40c2, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="8000f1f63804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) [ 547.664691] kvm: pic: non byte read [ 547.684600] kvm: pic: non byte read [ 547.704587] kvm: pic: non byte read 03:34:54 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'syz_tun\x00', 0x0}) [ 547.729076] kvm: pic: non byte write 03:34:54 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_SET_IRQCHIP(r2, 0xc208ae62, &(0x7f0000000300)={0x2}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x3b2, 0x0) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0xd, 0x2, {{0x20, 0x1, 0x6}, 0xffff}}, 0x18) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, r4, 0x0) listen(0xffffffffffffffff, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x46007a9c5a0bd5c3, &(0x7f000031e000)={0xa, 0xffbffffffffffffd, 0x0, @empty}, 0x31) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000100)=0x8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x6a2ad0f6184ddb1f, &(0x7f0000000180)={'veth0_to_bond\x00', @ifru_ivalue=0x1}}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r6, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x02\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=0x0}}) quotactl(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x100000000, 0x0, 0x0) llistxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=""/99, 0x63) 03:34:54 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x77}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) 03:34:54 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:54 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000ffe000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:34:54 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'syz_tun\x00', 0x0}) [ 547.865260] audit: type=1800 audit(2000000094.560:237): pid=19805 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="file0" dev="sda1" ino=17078 res=0 03:34:54 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:54 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'syz_tun\x00', 0x0}) 03:34:54 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x77}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) 03:34:54 executing program 5: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) write(r0, &(0x7f00000000c0), 0xfffffe13) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x91e6bfe12ebab9a5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000540)=@rxrpc=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e23, @local}}, 0x80, 0x0}, 0x801) pipe(0x0) write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) r3 = getpid() stat(&(0x7f0000000140)='./file0/../file0\x00', 0x0) setxattr$security_evm(0x0, 0x0, &(0x7f0000000a80)=@v2={0x0, 0x2, 0x0, 0xffffffffffffffff, 0x84, "34862e7e19fe17630c24664835b4dc3702c40d62dec806c7c22321dca726771dbd7d28e62dac48f44e863e32bc6b11611bc59bc223240405c8934d15f28f93881c3557abb83b76e1a46cabeee192fde510c76bd83ab5b2819e5113ed55056d405799aac22c4d92bef7cd348208cffb011de6c6906a0010e671a5eb93d3320b96d4f0ed6c"}, 0x8e, 0x3) tee(0xffffffffffffffff, r2, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0x0) nanosleep(&(0x7f00000000c0), &(0x7f0000000100)) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f00000005c0)={0x6, {{0xa, 0x4e23, 0x8001, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4}}, {{0xa, 0x4e22, 0x3ff, @ipv4={[], [], @multicast1}, 0x5}}}, 0x104) waitid(0x1, r3, &(0x7f0000000380), 0x40000000, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) write$P9_RRENAMEAT(r1, &(0x7f00000001c0)={0x7, 0x4b, 0x1}, 0x7) r5 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) fcntl$setstatus(r5, 0x4, 0x40400) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$KVM_SET_CLOCK(r4, 0x4030ae7b, &(0x7f0000000240)={0x2, 0x400000000000}) write$FUSE_WRITE(r5, &(0x7f0000000080)={0x18}, 0x18) ioctl$KVM_ARM_SET_DEVICE_ADDR(r4, 0x4010aeab, &(0x7f0000000000)={0x30000000000000, 0xd000}) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r0}) [ 548.050512] EXT4-fs (loop4): bad geometry: block count 1080 exceeds size of device (1 blocks) 03:34:54 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:55 executing program 4: write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000c00)=ANY=[@ANYRESOCT], 0x17) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002fc0)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000280)=""/230, 0xe6}, {&(0x7f0000000080)=""/52, 0x34}, {&(0x7f00000000c0)=""/91, 0x5b}], 0x3}}, {{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000580)=""/168, 0xa8}, {&(0x7f0000000640)=""/239, 0xef}, {&(0x7f0000000740)=""/205, 0xcd}, {&(0x7f0000000840)=""/98, 0x62}, {&(0x7f00000008c0)=""/86, 0x56}, {&(0x7f0000000940)=""/19, 0x13}, {&(0x7f0000000980)=""/113, 0x71}], 0x7}}], 0x2, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') setgroups(0x54b, &(0x7f0000000180)) pread64(r0, 0x0, 0x0, 0x0) 03:34:55 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000040)=@ethtool_sfeatures={0x3b, 0x1, [{0x10001, 0xfffffffffffff001}]}}) 03:34:55 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_SET_IRQCHIP(r2, 0xc208ae62, &(0x7f0000000300)={0x2}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x3b2, 0x0) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0xd, 0x2, {{0x20, 0x1, 0x6}, 0xffff}}, 0x18) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, r4, 0x0) listen(0xffffffffffffffff, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x46007a9c5a0bd5c3, &(0x7f000031e000)={0xa, 0xffbffffffffffffd, 0x0, @empty}, 0x31) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000100)=0x8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x6a2ad0f6184ddb1f, &(0x7f0000000180)={'veth0_to_bond\x00', @ifru_ivalue=0x1}}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r6, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x02\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=0x0}}) quotactl(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x100000000, 0x0, 0x0) 03:34:55 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x77}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) 03:34:55 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:55 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x77}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) 03:34:55 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:55 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000040)=@ethtool_sfeatures={0x3b, 0x1, [{0x10001, 0xfffffffffffff001}]}}) 03:34:55 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x2000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x800000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='memory.current\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000580)='memory.swap.curnty', 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000700)='tls\x00', 0x4) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xfffffffffffffe01, 0x4) r2 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x80000420) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000600)={'team_slave_0\x00', 0x5000}) r3 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000780)=ANY=[@ANYBLOB="7365637572697479000000000000000000000000000000002eb02600bf17a0fe920be9c92fc9638f032a04846eb300000000000000000e00000004000000180400003801000038010000780200007802000078020000d8030000d8030000d8030000d803", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/64], @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c8000c01000000000000000000000000000000000000000000000000440049444c4554494d45520000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000ffffe0000001fe8000000000000000000000000000aa000000000000000000000000000000000000000000000000000000000000000076657468315f746f5f626f6e64000000687773696d3000000000000000000000000004000000000000ff0000000000000000000000000000000000000000000000000000000000ff000000000000000000000000000000000000800000000000000000000000000000000000c000ec000000000000000000000000000000000000000000000000002400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006043f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010015401000000000000000000000000000000000000000000000000240069707600"], 0x3) unshare(0x8000400) mkdirat(r2, &(0x7f0000000740)='./bus\x00', 0x50) r4 = mq_open(&(0x7f0000000540)='-$\x00', 0x6e93ebbbcc0884f2, 0x104, 0x0) mq_notify(r4, 0x0) setsockopt$sock_int(r3, 0x1, 0x21, &(0x7f0000000140), 0x4) bind$inet6(r3, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$clear(0x7, 0xfffffffffffffffe) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0xfffffffffffffffd) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0x0) ftruncate(r5, 0x80003) 03:34:55 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000040)=@ethtool_sfeatures={0x3b, 0x1, [{0x10001, 0xfffffffffffff001}]}}) 03:34:55 executing program 5: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000800)='./file0\x00', 0x0) write$P9_RVERSION(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="1300000036ffff01ece4000600395032303030"], 0x13) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x168}}], 0x1, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x202000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) write$FUSE_NOTIFY_POLL(r3, &(0x7f0000000100)={0xffffffbc, 0x1, 0x0, {0x8}}, 0x18) lseek(r3, 0x0, 0x4) ftruncate(0xffffffffffffffff, 0x5) write$P9_RREAD(r3, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x402c5828, &(0x7f0000000000)={0x0, 0x1, 0x1001000200000000}) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0x4, 0x80000001, 0x412, 0x7, 0x0, 0x2, 0x4, 0x0, 0x1, 0x0, 0x7, 0x0, 0x2, 0x7, 0x4bb7, 0x5, 0x0, 0x5, 0x0, 0x3, 0x5, 0x7, 0x2, 0x8, 0x0, 0x8000, 0x4, 0x7f4, 0x1ff, 0x0, 0x800, 0x80000001, 0x0, 0x6, 0x9, 0x0, 0x0, 0xf0bc00000000, 0x2, @perf_bp={&(0x7f0000000040), 0x4}, 0x200, 0x5, 0x1f, 0x7, 0x7f, 0xfffffffffffffffa}, 0xffffffffffffffff, 0x7, r2, 0x1) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) connect$inet6(r4, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='pagemap\x00') sendfile(r4, r5, 0x0, 0xedc0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/sockstat\x00') ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r6, &(0x7f00000017c0), 0x35a, 0x0) r7 = dup(r0) write$FUSE_BMAP(r7, &(0x7f0000000000)={0x18}, 0x18) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$FUSE_ENTRY(r7, &(0x7f0000000140)={0x13d, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}}}, 0x90) 03:34:55 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:55 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) 03:34:55 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_SET_IRQCHIP(r2, 0xc208ae62, &(0x7f0000000300)={0x2}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x3b2, 0x0) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0xd, 0x2, {{0x20, 0x1, 0x6}, 0xffff}}, 0x18) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, r4, 0x0) listen(0xffffffffffffffff, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x46007a9c5a0bd5c3, &(0x7f000031e000)={0xa, 0xffbffffffffffffd, 0x0, @empty}, 0x31) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000100)=0x8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x6a2ad0f6184ddb1f, &(0x7f0000000180)={'veth0_to_bond\x00', @ifru_ivalue=0x1}}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r6, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x02\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=0x0}}) quotactl(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 03:34:55 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000040)=@ethtool_sfeatures={0x3b, 0x2, [{0x10001, 0xfffffffffffff001}, {}]}}) 03:34:55 executing program 4: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x2000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x800000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='memory.current\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000580)='memory.swap.curnty', 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000700)='tls\x00', 0x4) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000100)=0xfffffffffffffe01, 0x4) r2 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x80000420) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000600)={'team_slave_0\x00', 0x5000}) r3 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000780)=ANY=[@ANYBLOB="7365637572697479000000000000000000000000000000002eb02600bf17a0fe920be9c92fc9638f032a04846eb300000000000000000e00000004000000180400003801000038010000780200007802000078020000d8030000d8030000d8030000d803", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/64], @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c8000c01000000000000000000000000000000000000000000000000440049444c4554494d45520000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000ffffe0000001fe8000000000000000000000000000aa000000000000000000000000000000000000000000000000000000000000000076657468315f746f5f626f6e64000000687773696d3000000000000000000000000004000000000000ff0000000000000000000000000000000000000000000000000000000000ff000000000000000000000000000000000000800000000000000000000000000000000000c000ec000000000000000000000000000000000000000000000000002400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006043f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010015401000000000000000000000000000000000000000000000000240069707600"], 0x3) unshare(0x8000400) mkdirat(r2, &(0x7f0000000740)='./bus\x00', 0x50) r4 = mq_open(&(0x7f0000000540)='-$\x00', 0x6e93ebbbcc0884f2, 0x104, 0x0) mq_notify(r4, 0x0) setsockopt$sock_int(r3, 0x1, 0x21, &(0x7f0000000140), 0x4) bind$inet6(r3, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$clear(0x7, 0xfffffffffffffffe) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0xfffffffffffffffd) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0x0) ftruncate(r5, 0x80003) 03:34:55 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000040)=@ethtool_sfeatures={0x3b, 0x1, [{}]}}) 03:34:55 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:55 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) 03:34:56 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) 03:34:56 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000040)=@ethtool_sfeatures={0x3b, 0x1, [{}]}}) 03:34:56 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$netlink(0x10, 0x3, 0x8) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x8000, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r1}, 0x10) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0x1000, &(0x7f0000000ac0)="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", 0xf5, 0x0, &(0x7f00000004c0)="855d2bb88b2c191b63e21372f5f23340f007e0f6cc848b10286fedfd9ce3de3c939f4039d6888aa89f283c214ccadb54be1f3662c6b3f07dd0b31771c4f00c47bd3f46fa70f8d0d2c330e9b7c2a6889d83cb27f9c9914d61a6724f7f8d09e84ab90a830883be87d9fe55dd731bfd9f6968e475a8a8eadb225f4fadc09a5cea504b75d32b3212d877d3ebe20addf99cf116bfcaff31c93e5cb2d6fc574dc997e87811ed071cc68e0f4ba16d78992a51487c1ffe65e440f5a2ecc035aaac36bb37b132d8631b1002ce6e58c35edfdcb4afa8164effd3824600fe8acc48daa1693a8a264de96f386786944367aed9662a13a99966f4a3"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() kcmp(r2, 0x0, 0x4, 0xffffffffffffffff, r0) sendfile(0xffffffffffffffff, r0, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') r3 = openat(0xffffffffffffffff, &(0x7f0000000940)='./bus\x00', 0x1, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000009c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r3, &(0x7f0000000a80)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000a40)={&(0x7f0000000a00)={0x30, r4, 0x1, 0x70bd27, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x5, 0x7ff, 0x1}}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) ioctl$KVM_ASSIGN_SET_INTX_MASK(r3, 0x4040aea4, &(0x7f00000000c0)={0x8000, 0x1, 0x8, 0x4, 0x3}) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1, 0x2}) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) lseek(r5, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, &(0x7f0000000380)="440f20c0663501000000440f22c066b8001000000f23c00f21f8663500000a000f23f83e660f384120f30fc77200ba4100b004eef2e509baf80c66b887d5518066efbafc0cec0fc72c67653e0fc7b9090000000f01c2", 0x56}], 0x1, 0x0, &(0x7f0000000300)=[@dstype3={0x7, 0xa}, @flags={0x3, 0x244210}], 0x2) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='pids.events\x00', 0x0, 0x0) write$P9_RRENAME(r6, &(0x7f0000000340)={0x7, 0x15, 0x1}, 0x7) r7 = socket(0x8000000000000010, 0x2, 0x0) write(r7, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea080001001c7a6cb4", 0x24) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r9, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 03:34:56 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b7020000f7ffffffbfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e342b66b249b35e029184e290b39a6f2fc2a5e019bd9690000f002cf57bf887e0243c1145b8a34e6bdc4dc1af6d3c6958da4bddac602e0502aec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8f61e1574f21a5f03dff2c779bf342055ea309c9c7c6607b5a9004d5271b41be073657d3d439e8134c0f9413e0c53fbec2f1add5694dfc3fc201c6b1c22876921d414cfa9270d556a033d0cea20eb522fce4f95d9d21f5f8d9a863314835e8cc7f34f9cc41d25f2299fbae4492b8bd580e61b7bc945255bd8cbf9aaaf7f0d16f78b490cf3007ca"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_SET_IRQCHIP(r2, 0xc208ae62, &(0x7f0000000300)={0x2}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x3b2, 0x0) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0xd, 0x2, {{0x20, 0x1, 0x6}, 0xffff}}, 0x18) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, r4, 0x0) listen(0xffffffffffffffff, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x46007a9c5a0bd5c3, &(0x7f000031e000)={0xa, 0xffbffffffffffffd, 0x0, @empty}, 0x31) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000100)=0x8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x6a2ad0f6184ddb1f, &(0x7f0000000180)={'veth0_to_bond\x00', @ifru_ivalue=0x1}}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r6, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x02\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=0x0}}) 03:34:56 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x77}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) 03:34:56 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000040)=@ethtool_sfeatures={0x3b, 0x1, [{}]}}) 03:34:56 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:56 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$9p_unix(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1000, 0x0) mount$9p_fd(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0xb01421, &(0x7f0000000740)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}}) 03:34:56 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000040)=@ethtool_sfeatures={0x3b, 0x2, [{0x0, 0xfffffffffffff001}, {}]}}) 03:34:56 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x77}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) [ 549.615943] audit: type=1400 audit(2000000096.310:238): avc: denied { create } for pid=19914 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_iscsi_socket permissive=1 03:34:56 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:56 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x77}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) 03:34:56 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000040)=@ethtool_sfeatures={0x3b, 0x2, [{0x0, 0xfffffffffffff001}, {}]}}) 03:34:56 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b7020000f7ffffffbfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e342b66b249b35e029184e290b39a6f2fc2a5e019bd9690000f002cf57bf887e0243c1145b8a34e6bdc4dc1af6d3c6958da4bddac602e0502aec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8f61e1574f21a5f03dff2c779bf342055ea309c9c7c6607b5a9004d5271b41be073657d3d439e8134c0f9413e0c53fbec2f1add5694dfc3fc201c6b1c22876921d414cfa9270d556a033d0cea20eb522fce4f95d9d21f5f8d9a863314835e8cc7f34f9cc41d25f2299fbae4492b8bd580e61b7bc945255bd8cbf9aaaf7f0d16f78b490cf3007ca"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_SET_IRQCHIP(r2, 0xc208ae62, &(0x7f0000000300)={0x2}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x3b2, 0x0) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0xd, 0x2, {{0x20, 0x1, 0x6}, 0xffff}}, 0x18) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, r4, 0x0) listen(0xffffffffffffffff, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x46007a9c5a0bd5c3, &(0x7f000031e000)={0xa, 0xffbffffffffffffd, 0x0, @empty}, 0x31) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000100)=0x8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x6a2ad0f6184ddb1f, &(0x7f0000000180)={'veth0_to_bond\x00', @ifru_ivalue=0x1}}) socket$inet_tcp(0x2, 0x1, 0x0) 03:34:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$netlink(0x10, 0x3, 0x8) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x8000, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r1}, 0x10) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0x1000, &(0x7f0000000ac0)="431de2c9e60a66dab83324b59681e08bfde1e79dae6fd2524ae7369bc0e67ef382a78ecb414f6d2d4d67225fcf7820fdf1bea1ea02cb593bf2d38027fa6f51c7d28cf2ce6448afc9f0bd67c25947cee9fb0716a273c43f7bf710d951e80d137372b47d1172f497b3a067b3506c311a8d3df6150072d451ee6dfc0857b43db0fe0a8586c4dc88ef926ef8ff38cce426721e9be3836969f573f70317db059e3b725592330de9381d9a4448b9c5090da3dca02735d8eef8380eac0185953957bb82f9836dc3c4382fc42d9bbbd9645b22f97c405e8d61a7516321d898da07482a2c280445f9f337774cb478edbeb5d8e723d0f131827396c60922e5cca392baf0b73daa05eeaddbc09b5e4902ceb81e8755c1eb2eeee2e77623b1ca1294bcd188abec2a4f4bddce15acd5c0066c114260f1ecdad096adeb1825db57379332a094b89281dfc7bf8f88200c66be954f3f5ef3f6fe45586ee8e9cb04ead04ea0bb9de9130f42b6a0205a7fa7260eea639fd6ed21f92d28a93ba9c4faf8b74ff714996f3523f363eb316c9e31e4d8103d71223b3abc75c2faa7d53cba8b2e32cbad5fed09f6922db0521d348d0f23c0651b123a70ee1b6002bb598244352c693f4e489290352152567e4f07dd11f812d617f9e8b3bcc52f970b592a3e348abb274b45faf5722a4e3888687c2bd75b6fd9f55f7603e8f2553194530bd75ed80a6c1adebec558c5a926d9bc5655886f35dc11d43d4de608851117080e4633bbbfe4047e7deaabac347839c3530bdd0bb8dd6a922b0f1e865bf331f48aad9d68a99efc62d4c7b2c34245ca4749b7fe3adc2b0986e9e188374efd5c745949774d426ef120a111d8c72b62d4c3a2ff299f66cf80469acbfbacf0257372a566dec2cfd0e2925994afc46e781668f72c1c5786c717128b2ed60df52f446d5e72b20cd3808f39f5c72d8bda0aaa70c5fa214d87799a975bf4209805f1efce154567610cce788e84efee008e55996ffaeaf885989a59dc8689a6359427a76dbc03e668ac508615036e3a81a2b7879ec8233d6d569f4ebd6495d9f693b72dfb5f7f43b3600e1468b40836f5db8e4f2f97539024e1170ff67ee6fa31b3a15ee76858da1ea88c9894cdc0bba9ccbd40db36a9020c1f1a07fdfbbd48380ddcc99de42ca4b813010897bb2f54177a926a7da8029b5b1e82862033c6f83536d80bd3692f83a2cd961bc1c493e776e529bdf7d3a24b460561f647e28c3fc6aa13d8f7746d11bd5c38572b32c41a4689bf3b1f47656d4ad41231d47f336546725a903b444e63af8a275bd0a40c0d9ecd85b86479c530475b12de822ff30c86f9c2f47575b0ca70ee421683aa6a36d639264c6f763c5452c5aba565b07d1c16a9c9fe5e6af2a1477cad34c912aa7c0a20c693469fa1dcf7a61e73c250c0e4fc7c498dc35853516f3804fe3bc75a2706a6e6d562896fa304187b214fd8a32496f797e8d174cd80fa633060a287b3084d8731f166c57a50edf4c08580478a86ea41d8176b196a34be346a6001f36de79670954446c9bc87139108607e9aa322aa490ee6765507dba5c7386044e58b8ba25b10946229f29fb87ede6a590faa9b6c88fc32cc3e075e0b2a09e073318d38743fe3d62c025179c99bc6cb833a514b763abab3c5cde5ce17e9d175069b31f7a78b3da1daf242893fda94ae45b22c445b9b29fa11aef11273b64d33809307ba38e8cd8597749e4f31406e89b14fa51627fcac99f2d654ff2422a73efef960428b8fbf32f58b864a280f93bfbff7e8b772396533f2b851adaf77365768897d4bbe0726ba53bd7aa1d8e8d39b5a30e7f22df896b4eba7f0d1afd2900aa53fc6a4b3eb9107e2bc6c521894bd0ce72b2de99c742e9fad6aabe3fd3d7bd589ef820b28a2c876df8e56d88a5e8227c496cd637b4e9e91a4c50c6fe822a6701587d199fe39983d7ecae62bbcbcd62fde2ae0bc3f44baf8fdba031048451672381aca54682ac9d8687540137d263107db3179c546500981bb58a70a8ccba35e86b38f69c509a4385cc86840ec996ff1a8cc93672d8097110a0a76e557d6f65572d999a329855920cdb4fa3718d4ad94150dd3ce654bc1c5f904865cab6a979abc766aec9fe637cce157439ed336547bbd315ea6b4e520fb7644ef35d54f6b6464cc058784f7f2caacb7e99909c256b8865c96034480fc9c2f0388ea8f1bff5746c467be2b5344052a28fb42975b77f5bb235bdd4d7ceaf071d55db3cfc5c9871e91a8380a6207753e4e46a2891bb13d2649d37e88712f8cce33dfc6118f5dbeee1ebed30a6123001a146910876443f649b9ac679095216ab24b4ae08fed1d78b692322d43703520bd780bf10508ca97bac2a0b495404134f1d3a9fe48e78632fb48191036db954f4a77e0bb9b952b22f92ad639b2d4ef1b8d63a30d0724f9b3d6335836c33e15f93afca92e63354050641c75052c26b7255ed412056121b421c6a246480d4822eec84b7e50f772361bd40dc1e0265a9afd99c6265a88a4ab5a17ef280631f186faedb9ce2f1069feb01691116123aef204789eca5c4f56f5d74c8e17ceec12069311cd52ba2afea4b0a6ecda8ebad8ec37dc7e271f653e9975ef1b65e76d0dafe07bf72086c36385897f07491a716f95fa2e8ffcf61abf721ac7a3959185ae2b824a48d5b8afe42bb7eed511eccba0150ea80ae619e2176fe935105d5f53229c04261e9d63754dfa04a3e47bcfa27210e38a685b082f81dd54863ccec8565eb621c348ab345cca0f4ac9c8ac945ed56c3a1456e6c9dd420641a9cac3d4724a126de5748f60cadd54d8deb7f0977a7d3613b43e0df1737aa8796a2e71dd30f6fe1f9b9fe8902b93298f5240688c9816cade476f550a1b9bd1bccf637687eacb92f7c6010612f4f7965327ab565687c8029105649e250507bf7089b0353ae67ccebfb872d5e231fceb0ae4205d7c1aaed700989729fe25c298602710d87a75f2a4cd8e1f1dfb55b9ba56a74ec21acc8d0825256b2df5d62ec7ea55848fce12643a42b2172905b87178f9765ea7d912824b5b85d23364d3ae3b727b55943d3f10a64036a34d7d745a0d2a0c90eeabdc3e130eda83d26c283ed419964b1c8531a9e84e32d10be524e0be039e59bb563a86ea8555a20fbcc4b988fe69889cb6f582d6864e7e676e2d21384ffa5532546994b4c4b830541e4ee7560a6b11e43308af9df48bbf2f12f93e12633b0be3061e712af0f2459d3078b2c625d86b509f672d651455272af1a046becae6a59d285bd9e6205b6a0e0d37eeab6c867fe11a949cc23d8eae92025b4657248dfeb562619da22d94cb783704e61eb1ad2a686bc53d9d9f4c16e821715bde6d6de8f1fed410f03d93b47aa5a00014d146cf55f40b5388f6dff39a3e5fd4dedd7b67e5b27c0468b3e07c74785cae48c5888e2d94ec19155c28d88d5d63775fe25e55e44f152c4782be5ec3b2bc0dcffd4672775bb88b1e8e06fb0a95cfaec75320df668ef5c7a416de2ec725a497fa86a733eb4105660834ce2a5abea0f07077d47a7467570b907e9135974a869d0a6d6058b486770699dae35693ca6c48ecfaeee7e086a61892285de6c85e93d793999f0ad33a65d493ed399d79fafb87fd8fed8500af75d4677a6b3cf00733a6886794aa790f736d47cc94eacbd9eb8bc7892376165b97cbb0767b9b9f067d04bfc252fedce5585fbd3ecc7d5ba4ca2e7670f216b600828f1be40fa22103bd4218add1e470dbca6707b63e9ac76e9d36543b7c9d26dcbd0ee48d5a7d18a0451e44688db1a1cb2f4bc42126b55fa57548b92ce5e50a4843c319adf451d7b220fbd786f236cf5a41b9fad6a2dc59196c7664764b098c44e9c1b143fa34f1e0c397981dd8afad79f23009562d073380961d9170e44f0dfdc350c18e07018f2e6cdc62eccc68b7b478fe4bc722dfb20ca493c817fe4f0491c48a14745eb5c3bc08406182450b6c11308e67c4f968cbec3f52da31f35b610ec04f5ae890485a3eb384856618893bf6314b5bb6f9d2aa1e296cf682bdc7fee3a4283200fde90919c04296329b08aa1e0a35c03b35abae99458f67fbcd3605fa578250b08369aed35690534edc42b51e2ee7a4710b3993c14a7b0cff526e0ccbb5b08762214da8fe5c48a3daba5db7bb797f4b723bed8074e69d42d26743130369d27859ec9eec648c93fa66574e50d085e06365c4dc73480dfe69456fe435a46a32f68e8b1c82fa1a8148ab46a0fd989771b79036947250b4a2751484bd622a7e5ae3ead3a280902edee219ff11e4f916d8ade967955ff2a5ccbec042b1b7cce1c0800a25e5916e1a73900e8976aabd1ce2181b6f684b936ad0948262ac9962d9d4a445f2c08e708339d98264de9c6674c9842812eb07fa2e24fb5ae08df19302c2c9eceb901c30bb34da56db724d75e93d03155690b37561ad3c84197b8f50369d5d1d22fd094170d8280705a1716acfeb70894dfd64a95b542040d4ddf22af396620faefc41c767d2e3a1a9cc7e8039fc7d1c4dec26938a23d2c751d1b94e8629f6c60ddbf3fd78a65f95d043296b63261044d64842b7920204ec7c0d4fd25fa1c57207e5df308a25ab3a29dfbfff0b72e93528528b1f306ebcc5486c7dbba67cfe110e4f34b86ff90b02c526899175427c099f3348f6d8e70bc8ff095928bd3086a13b3e477fee7d52b1f6120bf986db9723e67ffffee57eeadc1816ba937ecd25134f60490f2a03ed6c3110268b92e22bd24d2641258d15aabed272dc5fb735578c2aa11974d79011c8c298416a914e89eccc9e9cc1c4834bd8a5df0311fffeb161cb1a4dbcb6c2308290868dc0df9d615686edea48944b091b6266af31ba29d301d2a83c172ee1ba39ca10d323764e4c5ce2581a6a345d55a068a8af22a86bfc7a065605e7d620566dcffcefc38346652c72bb74398ddfa12dccd63e81eeb3d694ae841b9947e651e12e322c7dba0312d0ac9ba62aab9724fea936aa74b092d50a83d051e768d3497723ff27f63bf2ee3afe8ec31b55b1cb7346d929f263ed9b68a88c97d489d24e621650d9df0921964a7dae86557e57c2c2952cb6762b7d6a223f6879197f2e29307c16ae5205355e5ca7c2b1feb29f17712a933aa4e676ccfe74ceb67004702ea9cfb66cf238641fbe218994bf409550537a7a65222a1258afd25d0db6345492d54f509c1ff3181920ca16adb88c4b44922f29e8669583e35417145e6e826ece6efafecd23fa3f52e6edd9a26a3c2a3b9bc6bca3d5e5403b38ecff89d69f0eb43012b51e9860ab81530bb9cc669512a56fe95f4c2660e064872a7bfde511b6e6a6ce3d400d6c5f3d2491122d77ed682725be215d1f131d13c1cded630dfc8e38ceca28b6e4712daf22f6a964db0b3b9a9a48dc4dae2031b9fc16f28c3cc1b5479cb670458c19733272b0ea432ad78ebecb7065233980ce949d305dde117a2992eba1552bc1e915b29275cb88aa873cf4729dfad155ce04476cacdc7a20f7bda2dd98b325afe7627f6c32bcc48e580f382eb329df2923bf055afc6809823c934747658673ebfec1353f2fd15cf3351f31aaec0ae41bed192c69811426d8bb79b776a355b57b49c056317a583aec832c2ca0e1d65e845952cb7d88064d7afb4df3fe33072635236f2c07d789c04d59eae65a1016c71e97110d4c6d58768329c59435f6761f2bc4c237ea7514c492301bd2490d7d6ffb3740600fccce2a5c58a8a1f1359144d36d6079f519e858976b522fa176794b5f506da8b579fc913afb61a86a9638", 0xf5, 0x0, &(0x7f00000004c0)="855d2bb88b2c191b63e21372f5f23340f007e0f6cc848b10286fedfd9ce3de3c939f4039d6888aa89f283c214ccadb54be1f3662c6b3f07dd0b31771c4f00c47bd3f46fa70f8d0d2c330e9b7c2a6889d83cb27f9c9914d61a6724f7f8d09e84ab90a830883be87d9fe55dd731bfd9f6968e475a8a8eadb225f4fadc09a5cea504b75d32b3212d877d3ebe20addf99cf116bfcaff31c93e5cb2d6fc574dc997e87811ed071cc68e0f4ba16d78992a51487c1ffe65e440f5a2ecc035aaac36bb37b132d8631b1002ce6e58c35edfdcb4afa8164effd3824600fe8acc48daa1693a8a264de96f386786944367aed9662a13a99966f4a3"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() kcmp(r2, 0x0, 0x4, 0xffffffffffffffff, r0) sendfile(0xffffffffffffffff, r0, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') r3 = openat(0xffffffffffffffff, &(0x7f0000000940)='./bus\x00', 0x1, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000009c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r3, &(0x7f0000000a80)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000a40)={&(0x7f0000000a00)={0x30, r4, 0x1, 0x70bd27, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x5, 0x7ff, 0x1}}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) ioctl$KVM_ASSIGN_SET_INTX_MASK(r3, 0x4040aea4, &(0x7f00000000c0)={0x8000, 0x1, 0x8, 0x4, 0x3}) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1, 0x2}) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) lseek(r5, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, &(0x7f0000000380)="440f20c0663501000000440f22c066b8001000000f23c00f21f8663500000a000f23f83e660f384120f30fc77200ba4100b004eef2e509baf80c66b887d5518066efbafc0cec0fc72c67653e0fc7b9090000000f01c2", 0x56}], 0x1, 0x0, &(0x7f0000000300)=[@dstype3={0x7, 0xa}, @flags={0x3, 0x244210}], 0x2) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='pids.events\x00', 0x0, 0x0) write$P9_RRENAME(r6, &(0x7f0000000340)={0x7, 0x15, 0x1}, 0x7) r7 = socket(0x8000000000000010, 0x2, 0x0) write(r7, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea080001001c7a6cb4", 0x24) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r9, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 03:34:56 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) fcntl$lock(r0, 0x24, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff}) 03:34:56 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000040)=@ethtool_sfeatures={0x3b, 0x2, [{0x0, 0xfffffffffffff001}, {}]}}) 03:34:56 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x0, 0x0, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 03:34:56 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$netlink(0x10, 0x3, 0x8) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x8000, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r1}, 0x10) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0x1000, &(0x7f0000000ac0)="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", 0xf5, 0x0, &(0x7f00000004c0)="855d2bb88b2c191b63e21372f5f23340f007e0f6cc848b10286fedfd9ce3de3c939f4039d6888aa89f283c214ccadb54be1f3662c6b3f07dd0b31771c4f00c47bd3f46fa70f8d0d2c330e9b7c2a6889d83cb27f9c9914d61a6724f7f8d09e84ab90a830883be87d9fe55dd731bfd9f6968e475a8a8eadb225f4fadc09a5cea504b75d32b3212d877d3ebe20addf99cf116bfcaff31c93e5cb2d6fc574dc997e87811ed071cc68e0f4ba16d78992a51487c1ffe65e440f5a2ecc035aaac36bb37b132d8631b1002ce6e58c35edfdcb4afa8164effd3824600fe8acc48daa1693a8a264de96f386786944367aed9662a13a99966f4a3"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() kcmp(r2, 0x0, 0x4, 0xffffffffffffffff, r0) sendfile(0xffffffffffffffff, r0, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') r3 = openat(0xffffffffffffffff, &(0x7f0000000940)='./bus\x00', 0x1, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000009c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r3, &(0x7f0000000a80)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000a40)={&(0x7f0000000a00)={0x30, r4, 0x1, 0x70bd27, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x5, 0x7ff, 0x1}}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) ioctl$KVM_ASSIGN_SET_INTX_MASK(r3, 0x4040aea4, &(0x7f00000000c0)={0x8000, 0x1, 0x8, 0x4, 0x3}) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1, 0x2}) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) lseek(r5, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, &(0x7f0000000380)="440f20c0663501000000440f22c066b8001000000f23c00f21f8663500000a000f23f83e660f384120f30fc77200ba4100b004eef2e509baf80c66b887d5518066efbafc0cec0fc72c67653e0fc7b9090000000f01c2", 0x56}], 0x1, 0x0, &(0x7f0000000300)=[@dstype3={0x7, 0xa}, @flags={0x3, 0x244210}], 0x2) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='pids.events\x00', 0x0, 0x0) write$P9_RRENAME(r6, &(0x7f0000000340)={0x7, 0x15, 0x1}, 0x7) r7 = socket(0x8000000000000010, 0x2, 0x0) write(r7, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea080001001c7a6cb4", 0x24) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r9, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 03:34:56 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000040)=@ethtool_sfeatures={0x3b, 0x2, [{0x10001}, {}]}}) 03:34:56 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:56 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x0, 0x0, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 03:34:56 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000040)=@ethtool_sfeatures={0x3b, 0x2, [{0x10001}, {}]}}) 03:34:56 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_SET_IRQCHIP(r2, 0xc208ae62, &(0x7f0000000300)={0x2}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x3b2, 0x0) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0xd, 0x2, {{0x20, 0x1, 0x6}, 0xffff}}, 0x18) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, r4, 0x0) listen(0xffffffffffffffff, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x46007a9c5a0bd5c3, &(0x7f000031e000)={0xa, 0xffbffffffffffffd, 0x0, @empty}, 0x31) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000100)=0x8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000100)=@req={0x6a2ad0f6184ddb1f, &(0x7f0000000180)={'veth0_to_bond\x00', @ifru_ivalue=0x1}}) 03:34:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$netlink(0x10, 0x3, 0x8) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x8000, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r1}, 0x10) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x40806685, &(0x7f00000005c0)={0x1, 0x1, 0x1000, 0x1000, &(0x7f0000000ac0)="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", 0xf5, 0x0, &(0x7f00000004c0)="855d2bb88b2c191b63e21372f5f23340f007e0f6cc848b10286fedfd9ce3de3c939f4039d6888aa89f283c214ccadb54be1f3662c6b3f07dd0b31771c4f00c47bd3f46fa70f8d0d2c330e9b7c2a6889d83cb27f9c9914d61a6724f7f8d09e84ab90a830883be87d9fe55dd731bfd9f6968e475a8a8eadb225f4fadc09a5cea504b75d32b3212d877d3ebe20addf99cf116bfcaff31c93e5cb2d6fc574dc997e87811ed071cc68e0f4ba16d78992a51487c1ffe65e440f5a2ecc035aaac36bb37b132d8631b1002ce6e58c35edfdcb4afa8164effd3824600fe8acc48daa1693a8a264de96f386786944367aed9662a13a99966f4a3"}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() kcmp(r2, 0x0, 0x4, 0xffffffffffffffff, r0) sendfile(0xffffffffffffffff, r0, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') r3 = openat(0xffffffffffffffff, &(0x7f0000000940)='./bus\x00', 0x1, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000009c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r3, &(0x7f0000000a80)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000a40)={&(0x7f0000000a00)={0x30, r4, 0x1, 0x70bd27, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x5, 0x7ff, 0x1}}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) ioctl$KVM_ASSIGN_SET_INTX_MASK(r3, 0x4040aea4, &(0x7f00000000c0)={0x8000, 0x1, 0x8, 0x4, 0x3}) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1, 0x2}) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) lseek(r5, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, &(0x7f0000000380)="440f20c0663501000000440f22c066b8001000000f23c00f21f8663500000a000f23f83e660f384120f30fc77200ba4100b004eef2e509baf80c66b887d5518066efbafc0cec0fc72c67653e0fc7b9090000000f01c2", 0x56}], 0x1, 0x0, &(0x7f0000000300)=[@dstype3={0x7, 0xa}, @flags={0x3, 0x244210}], 0x2) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='pids.events\x00', 0x0, 0x0) write$P9_RRENAME(r6, &(0x7f0000000340)={0x7, 0x15, 0x1}, 0x7) r7 = socket(0x8000000000000010, 0x2, 0x0) write(r7, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea080001001c7a6cb4", 0x24) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r9, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 03:34:56 executing program 4: clone(0x2000922100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open(0x0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x730f010000000000, &(0x7f0000000000)={&(0x7f0000000480)=ANY=[@ANYBLOB="680000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000048001200100001006970366772657461700000003400020014000600fe8000000000000000000000000000aa14000700fe8000000000000000000007000000aa08000100", @ANYRES32=r3], 0x68}}, 0x0) wait4(0x0, 0x0, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, 0x0) getpid() 03:34:56 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x0, 0x0, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 03:34:56 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000040)=@ethtool_sfeatures={0x3b, 0x2, [{0x10001}, {}]}}) 03:34:56 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) [ 550.220855] batman_adv: Cannot find parent device 03:34:57 executing program 4: clone(0x2000922100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open(0x0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x730f010000000000, &(0x7f0000000000)={&(0x7f0000000480)=ANY=[@ANYBLOB="680000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000048001200100001006970366772657461700000003400020014000600fe8000000000000000000000000000aa14000700fe8000000000000000000007000000aa08000100", @ANYRES32=r3], 0x68}}, 0x0) wait4(0x0, 0x0, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, 0x0) getpid() 03:34:57 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x77}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) [ 550.310111] net_ratelimit: 25 callbacks suppressed [ 550.310117] protocol 88fb is buggy, dev hsr_slave_0 [ 550.320225] protocol 88fb is buggy, dev hsr_slave_1 03:34:57 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x35, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{}]}, 0x10) 03:34:57 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:34:57 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x77}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) 03:34:57 executing program 4: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) stat(&(0x7f0000001240)='./file0\x00', &(0x7f0000001280)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x4, 0xa2c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xb9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', 0x0, 0x100000000, 0x4, &(0x7f0000001200)=[{&(0x7f0000000100)="ecb542c8", 0x4, 0x10000}, {&(0x7f0000000140)="b6fb068f2c74077a351f6374168662e1db7d5b94ceb919f9bbe21bf0a8539584b9d429a87a00e02dc9e607cd9a74d74b5e3195979099ba09a4a867aa7bffb32df8e34d104dba7e2734e07ee19e5f03e3", 0x50, 0x4}, {0x0}, {&(0x7f00000011c0)="d7ccfa3733762a5cec84e7f68cad62611e76cfc753b5", 0x16}], 0x200002, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) write$FUSE_ENTRY(r0, &(0x7f0000000380)={0x90, 0xffffffffffffffda, 0x0, {0x6, 0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}}, 0x90) write$P9_RXATTRWALK(0xffffffffffffffff, &(0x7f0000000000)={0xf, 0x1f, 0x2, 0x3}, 0xf) r1 = open$dir(&(0x7f0000000740)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000700)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7ffffff0) sendfile(r1, r1, &(0x7f0000000140)=0x8800, 0x8800000) [ 550.412102] batman_adv: Cannot find parent device 03:34:57 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b7020000f7ffffffbfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e342b66b249b35e029184e290b39a6f2fc2a5e019bd9690000f002cf57bf887e0243c1145b8a34e6bdc4dc1af6d3c6958da4bddac602e0502aec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8f61e1574f21a5f03dff2c779bf342055ea309c9c7c6607b5a9004d5271b41be073657d3d439e8134c0f9413e0c53fbec2f1add5694dfc3fc201c6b1c22876921d414cfa9270d556a033d0cea20eb522fce4f95d9d21f5f8d9a863314835e8cc7f34f9cc41d25f2299fbae4492b8bd580e61b7bc945255bd8cbf9aaaf7f0d16f78b490cf3007ca"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_SET_IRQCHIP(r2, 0xc208ae62, &(0x7f0000000300)={0x2}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x3b2, 0x0) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0xd, 0x2, {{0x20, 0x1, 0x6}, 0xffff}}, 0x18) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, r4, 0x0) listen(0xffffffffffffffff, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x46007a9c5a0bd5c3, &(0x7f000031e000)={0xa, 0xffbffffffffffffd, 0x0, @empty}, 0x31) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000100)=0x8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) [ 550.470157] protocol 88fb is buggy, dev hsr_slave_0 [ 550.475294] protocol 88fb is buggy, dev hsr_slave_1 [ 550.550109] protocol 88fb is buggy, dev hsr_slave_0 [ 550.555287] protocol 88fb is buggy, dev hsr_slave_1 [ 550.710423] protocol 88fb is buggy, dev hsr_slave_0 [ 550.715926] protocol 88fb is buggy, dev hsr_slave_1 [ 551.510254] protocol 88fb is buggy, dev hsr_slave_0 [ 551.515372] protocol 88fb is buggy, dev hsr_slave_1 [ 551.920544] device bridge_slave_1 left promiscuous mode [ 551.926164] bridge0: port 2(bridge_slave_1) entered disabled state [ 551.970949] device bridge_slave_0 left promiscuous mode [ 551.976667] bridge0: port 1(bridge_slave_0) entered disabled state [ 552.083679] device hsr_slave_1 left promiscuous mode [ 552.123838] device hsr_slave_0 left promiscuous mode [ 552.173168] team0 (unregistering): Port device team_slave_1 removed [ 552.183416] team0 (unregistering): Port device team_slave_0 removed [ 552.194418] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 552.235944] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 552.324329] bond0 (unregistering): Released all slaves [ 554.291501] IPVS: ftp: loaded support on port[0] = 21 [ 555.381426] chnl_net:caif_netlink_parms(): no params data found [ 555.428025] bridge0: port 1(bridge_slave_0) entered blocking state [ 555.438927] bridge0: port 1(bridge_slave_0) entered disabled state [ 555.446381] device bridge_slave_0 entered promiscuous mode [ 555.454095] bridge0: port 2(bridge_slave_1) entered blocking state [ 555.460903] bridge0: port 2(bridge_slave_1) entered disabled state [ 555.467884] device bridge_slave_1 entered promiscuous mode [ 555.488357] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 555.497508] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 555.524307] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 555.531755] team0: Port device team_slave_0 added [ 555.537509] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 555.545436] team0: Port device team_slave_1 added [ 555.550838] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 555.558263] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 555.634083] device hsr_slave_0 entered promiscuous mode [ 555.670133] net_ratelimit: 22 callbacks suppressed [ 555.675142] protocol 88fb is buggy, dev hsr_slave_0 [ 555.680379] protocol 88fb is buggy, dev hsr_slave_1 [ 555.685539] protocol 88fb is buggy, dev hsr_slave_0 [ 555.690617] protocol 88fb is buggy, dev hsr_slave_1 [ 555.710433] device hsr_slave_1 entered promiscuous mode [ 555.760661] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 555.767667] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 555.785868] bridge0: port 2(bridge_slave_1) entered blocking state [ 555.792326] bridge0: port 2(bridge_slave_1) entered forwarding state [ 555.799038] bridge0: port 1(bridge_slave_0) entered blocking state [ 555.805463] bridge0: port 1(bridge_slave_0) entered forwarding state [ 555.843063] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 555.849166] 8021q: adding VLAN 0 to HW filter on device bond0 [ 555.859186] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 555.868474] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 555.876832] bridge0: port 1(bridge_slave_0) entered disabled state [ 555.883992] bridge0: port 2(bridge_slave_1) entered disabled state [ 555.894908] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 555.901426] 8021q: adding VLAN 0 to HW filter on device team0 [ 555.919220] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 555.927642] bridge0: port 1(bridge_slave_0) entered blocking state [ 555.934214] bridge0: port 1(bridge_slave_0) entered forwarding state [ 555.942011] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 555.949764] bridge0: port 2(bridge_slave_1) entered blocking state [ 555.956328] bridge0: port 2(bridge_slave_1) entered forwarding state [ 555.972064] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 555.980145] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 555.988597] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 555.990305] protocol 88fb is buggy, dev hsr_slave_0 [ 556.000223] protocol 88fb is buggy, dev hsr_slave_1 [ 556.010821] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 556.028221] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 556.039222] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 556.045991] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 556.053461] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 556.074157] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 556.086170] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 556.170146] protocol 88fb is buggy, dev hsr_slave_0 [ 556.175411] protocol 88fb is buggy, dev hsr_slave_1 [ 556.240890] device bridge_slave_1 left promiscuous mode [ 556.246477] bridge0: port 2(bridge_slave_1) entered disabled state [ 556.290118] protocol 88fb is buggy, dev hsr_slave_0 [ 556.295713] protocol 88fb is buggy, dev hsr_slave_1 [ 556.301118] device bridge_slave_0 left promiscuous mode [ 556.306659] bridge0: port 1(bridge_slave_0) entered disabled state [ 556.424174] device hsr_slave_1 left promiscuous mode [ 556.464119] device hsr_slave_0 left promiscuous mode [ 556.515281] team0 (unregistering): Port device team_slave_1 removed [ 556.526825] team0 (unregistering): Port device team_slave_0 removed [ 556.537769] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 556.604629] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 556.695865] bond0 (unregistering): Released all slaves 03:35:03 executing program 5: r0 = socket(0x10, 0x2, 0xc) open(0x0, 0x0, 0x0) tkill(0x0, 0x0) write(r0, &(0x7f00000000c0)="1f0000000102ff00fd435463e4af645515b81e0008000100010423dcffdf00", 0x402) 03:35:03 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:35:03 executing program 1: openat$pidfd(0xffffffffffffff9c, &(0x7f0000001700)='/proc/self\x00', 0x610102, 0x0) 03:35:03 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x77}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) 03:35:03 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_SET_IRQCHIP(r2, 0xc208ae62, &(0x7f0000000300)={0x2}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x3b2, 0x0) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0xd, 0x2, {{0x20, 0x1, 0x6}, 0xffff}}, 0x18) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, r4, 0x0) listen(0xffffffffffffffff, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x46007a9c5a0bd5c3, &(0x7f000031e000)={0xa, 0xffbffffffffffffd, 0x0, @empty}, 0x31) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000100)=0x8) 03:35:03 executing program 4: r0 = socket(0x10, 0x2, 0xc) tkill(0x0, 0x0) write(r0, &(0x7f0000000240)="1f00000010000100010423dcffdf0070593d72e2bf77cf3391d8d2dc404e6020416032086d91e4beef286396bbc07937212764d55fdc44a20277e7e6056373002e5e1dad4d2de8e50dbd61ace010290c70bf6e9bab3eab3540cd161876e4693c297d2d522f3f5e0a62c80774bd5ba72653dcba170acbcfebe1f72cf97f11803fd28738bae57ebd0b3e7df3708a43f190299ddc83e684683ca300ac2e74558fa9b50c03c1a045f742ac881a754008a5e0173b1fce4f79a19985c2bc958e976bd8cd14e6dacf560b67ffff000010c9be273326694e6583a1d2d0ca0588e894c3d592f2cc14100002000000000000df7f5d57367a88b5e2b932dd034c246b90e2da65edc5b304c3040000007a0ea5f7f1584d68502cb32b84e98b0f2f6b69a7ccf199f0e69afdaa576f43cf24e01e9daab6d420c451cf5926ef300a7232a861ff035bb649bb2fe9a6c7dabd671671fb1711d4b7aae2466ca9e8316b8b70c3ca9585822198fb890c92cfdb49253ab18aeee8131c7122d68e54adc5cad2d837bcc209a356682c034d67", 0xfc82) r1 = dup3(r0, r0, 0x80000) write$selinux_attr(r1, &(0x7f0000000000)='system_u:object_r:systemd_unit_file_t:s0\x00', 0x29) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) pselect6(0x0, 0x0, &(0x7f0000000100)={0x0, 0x9, 0x7, 0x6016cbfe, 0x0, 0xc47, 0x2, 0xe99}, &(0x7f0000000140)={0x7, 0x1d, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x80}, &(0x7f0000000280)={r2, r3+30000000}, &(0x7f00000004c0)={&(0x7f0000000400)={0x72d72e7e}, 0x8}) r4 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f00000003c0)=[@textreal={0x8, &(0x7f0000000380)="f00fc74f94ba4000b87700ef83d0bb263e050c00bad00466b86b00000066ef0f005c8e0fe82d66b98b0800000f320f013fbad10466b80000000066ef", 0x3c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000002c0)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') preadv(r7, &(0x7f00000017c0), 0x333, 0x0) [ 556.765176] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 03:35:03 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x77}}, 0x0, 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 03:35:03 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:35:03 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x8) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) mremap(&(0x7f0000ff6000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) madvise(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0xca) mremap(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffd000/0x3000)=nil) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000000000cb) [ 556.836105] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. 03:35:03 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x77}}, 0x0, 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 03:35:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x1000000005, 0x0, &(0x7f000087fff8)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000000bc0), 0x4000000000002e5, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000004e00)=[{0x0, 0x36b, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000000000000010000d204000000b83859e9a3ac0001000000", @ANYRES32, @ANYRES32], 0x18}], 0x492492492492556, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000180)=0x545, 0x1c5) memfd_create(0x0, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00'}) 03:35:03 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_SET_IRQCHIP(r2, 0xc208ae62, &(0x7f0000000300)={0x2}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x3b2, 0x0) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0xd, 0x2, {{0x20, 0x1, 0x6}, 0xffff}}, 0x18) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, r3, 0x0) listen(0xffffffffffffffff, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x46007a9c5a0bd5c3, &(0x7f000031e000)={0xa, 0xffbffffffffffffd, 0x0, @empty}, 0x31) 03:35:03 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:35:03 executing program 1: clock_adjtime(0x0, &(0x7f00000000c0)={0x20000000000027ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffc99a3b}) 03:35:03 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x77}}, 0x0, 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 03:35:03 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(0xffffffffffffffff, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:35:03 executing program 1: clone(0x2000922100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x200000002, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, 0x0) [ 557.613808] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. 03:35:04 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x77}}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0xcf, &(0x7f0000000340)=""/207}, 0x48) 03:35:04 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000000040)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x84}]}, &(0x7f0000000000)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 03:35:04 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x20000000000001, 0x3, &(0x7f0000000340)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0x1d}}, &(0x7f0000000240)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x10000000000001, 0x39c, &(0x7f0000000580)=""/195, 0x0, 0x0, [0x42]}, 0x48) 03:35:04 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0xb) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000100)='./file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f00000002c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:35:04 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b7020000f7ffffffbfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e342b66b249b35e029184e290b39a6f2fc2a5e019bd9690000f002cf57bf887e0243c1145b8a34e6bdc4dc1af6d3c6958da4bddac602e0502aec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8f61e1574f21a5f03dff2c779bf342055ea309c9c7c6607b5a9004d5271b41be073657d3d439e8134c0f9413e0c53fbec2f1add5694dfc3fc201c6b1c22876921d414cfa9270d556a033d0cea20eb522fce4f95d9d21f5f8d9a863314835e8cc7f34f9cc41d25f2299fbae4492b8bd580e61b7bc945255bd8cbf9aaaf7f0d16f78b490cf3007ca"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_SET_IRQCHIP(r2, 0xc208ae62, &(0x7f0000000300)={0x2}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x3b2, 0x0) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0xd, 0x2, {{0x20, 0x1, 0x6}, 0xffff}}, 0x18) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, r3, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 03:35:04 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0xfc, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet6(r0, &(0x7f0000000080)="030400000300600000000000fff57b016d2763bd56373780398d537500e51100591f031ee616d5c0184374a7ffe4ec55e0654786a70100935ba514d40808efa000801600002fd08d49a47eff71bc4131fe4c1f99bf00a900000008d1843e770afd6e9ef5837dbd0000000053", 0x6c, 0x0, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) 03:35:04 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x77}}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0xcf, &(0x7f0000000340)=""/207}, 0x48) 03:35:04 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x77}}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0xcf, &(0x7f0000000340)=""/207}, 0x48) 03:35:04 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_SET_IRQCHIP(r2, 0xc208ae62, &(0x7f0000000300)={0x2}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x3b2, 0x0) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0xd, 0x2, {{0x20, 0x1, 0x6}, 0xffff}}, 0x18) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, r3, 0x0) listen(0xffffffffffffffff, 0x0) 03:35:04 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x77}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 03:35:04 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(0xffffffffffffffff, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:35:04 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x77}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 03:35:04 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_SET_IRQCHIP(r2, 0xc208ae62, &(0x7f0000000300)={0x2}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x3b2, 0x0) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0xd, 0x2, {{0x20, 0x1, 0x6}, 0xffff}}, 0x18) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, r3, 0x0) [ 559.780681] device bridge_slave_1 left promiscuous mode [ 559.786307] bridge0: port 2(bridge_slave_1) entered disabled state [ 559.840841] device bridge_slave_0 left promiscuous mode [ 559.846477] bridge0: port 1(bridge_slave_0) entered disabled state [ 559.995263] device hsr_slave_1 left promiscuous mode [ 560.053731] device hsr_slave_0 left promiscuous mode [ 560.093690] team0 (unregistering): Port device team_slave_1 removed [ 560.107164] team0 (unregistering): Port device team_slave_0 removed [ 560.117656] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 560.146453] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 560.214134] bond0 (unregistering): Released all slaves [ 560.950155] net_ratelimit: 26 callbacks suppressed [ 560.950161] protocol 88fb is buggy, dev hsr_slave_0 [ 560.960220] protocol 88fb is buggy, dev hsr_slave_1 [ 561.111098] protocol 88fb is buggy, dev hsr_slave_0 [ 561.116209] protocol 88fb is buggy, dev hsr_slave_1 [ 561.910176] protocol 88fb is buggy, dev hsr_slave_0 [ 561.915274] protocol 88fb is buggy, dev hsr_slave_1 [ 561.920393] protocol 88fb is buggy, dev hsr_slave_0 [ 561.925474] protocol 88fb is buggy, dev hsr_slave_1 [ 562.061482] IPVS: ftp: loaded support on port[0] = 21 [ 562.240187] protocol 88fb is buggy, dev hsr_slave_0 [ 562.245303] protocol 88fb is buggy, dev hsr_slave_1 [ 562.943128] chnl_net:caif_netlink_parms(): no params data found [ 562.983966] bridge0: port 1(bridge_slave_0) entered blocking state [ 562.990670] bridge0: port 1(bridge_slave_0) entered disabled state [ 562.997923] device bridge_slave_0 entered promiscuous mode [ 563.005364] bridge0: port 2(bridge_slave_1) entered blocking state [ 563.012223] bridge0: port 2(bridge_slave_1) entered disabled state [ 563.019281] device bridge_slave_1 entered promiscuous mode [ 563.039690] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 563.048925] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 563.069574] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 563.077039] team0: Port device team_slave_0 added [ 563.082684] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 563.089782] team0: Port device team_slave_1 added [ 563.095300] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 563.102897] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 563.173733] device hsr_slave_0 entered promiscuous mode [ 563.240343] device hsr_slave_1 entered promiscuous mode [ 563.280620] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 563.288424] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 563.303849] bridge0: port 2(bridge_slave_1) entered blocking state [ 563.310282] bridge0: port 2(bridge_slave_1) entered forwarding state [ 563.317041] bridge0: port 1(bridge_slave_0) entered blocking state [ 563.323644] bridge0: port 1(bridge_slave_0) entered forwarding state [ 563.353958] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 563.360639] 8021q: adding VLAN 0 to HW filter on device bond0 [ 563.368974] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 563.378456] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 563.386171] bridge0: port 1(bridge_slave_0) entered disabled state [ 563.393367] bridge0: port 2(bridge_slave_1) entered disabled state [ 563.404615] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 563.411157] 8021q: adding VLAN 0 to HW filter on device team0 [ 563.420421] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 563.428270] bridge0: port 1(bridge_slave_0) entered blocking state [ 563.434756] bridge0: port 1(bridge_slave_0) entered forwarding state [ 563.450348] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 563.458190] bridge0: port 2(bridge_slave_1) entered blocking state [ 563.464680] bridge0: port 2(bridge_slave_1) entered forwarding state [ 563.475263] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 563.483723] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 563.499448] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 563.509878] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 563.520766] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 563.527498] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 563.535737] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 563.543509] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 563.551718] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 563.562840] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 563.575235] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 563.930636] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 03:35:11 executing program 5: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f000052fff8)='./file0\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') ioctl$EXT4_IOC_SETFLAGS(r0, 0x40046602, &(0x7f0000000040)=0x100cd) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 03:35:11 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x77}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 03:35:11 executing program 4: close(0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'batadv0\x00'}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ptrace(0x4207, 0x0) ptrace$getregs(0x1a, 0x0, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x3, &(0x7f0000000100)=0x0) io_submit(r1, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in=@initdev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f00000007c0)=0xe8) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x44000) io_submit(0x0, 0x0, &(0x7f0000000540)) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x44000) io_setup(0x3, &(0x7f0000000100)=0x0) io_submit(r4, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r3, &(0x7f0000000000), 0x377140be6b5ef4c7}]) accept4$inet(r3, &(0x7f0000001cc0)={0x2, 0x0, @broadcast}, &(0x7f0000001d00)=0x10, 0xc0800) creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x44000) io_setup(0x3, &(0x7f0000000100)=0x0) io_submit(r5, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r6 = memfd_create(&(0x7f0000000000)='\x00', 0x0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0x1, 0x2011, r6, 0x0) r7 = memfd_create(&(0x7f0000000000)='\x00', 0x0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0x1, 0x10, r7, 0x0) memfd_create(&(0x7f0000000000)='\x00', 0x0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0x0, 0x2011, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x2) r8 = memfd_create(&(0x7f0000000000)='\x00', 0x0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0x1, 0x2011, r8, 0x0) r9 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r9, 0x4, 0x44000) io_setup(0x0, &(0x7f0000000100)) io_submit(0x0, 0x1, &(0x7f0000000540)=[0x0]) bpf$OBJ_GET_MAP(0x7, &(0x7f0000002040)={&(0x7f0000002000)='./file0\x00', 0x0, 0x8}, 0x10) r10 = memfd_create(&(0x7f0000000000)='\x00', 0x0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0x1, 0x2011, r10, 0x0) r11 = inotify_init1(0x0) fcntl$setown(r11, 0x8, 0xffffffffffffffff) fcntl$getownex(r11, 0x10, &(0x7f00000002c0)={0x0, 0x0}) ptrace$setopts(0x4206, r12, 0x0, 0x0) ptrace(0x4207, r12) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x44000) 03:35:11 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_SET_IRQCHIP(r2, 0xc208ae62, &(0x7f0000000300)={0x2}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x3b2, 0x0) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0xd, 0x2, {{0x20, 0x1, 0x6}, 0xffff}}, 0x18) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) 03:35:11 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_NESTED_STATE(0xffffffffffffffff, 0x4080aebf, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6af9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r2 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f00000004c0)=ANY=[@ANYBLOB="055e3ca0b7253630de20b6ffafb179bf8eff3a6de93b11f91e792496b70000002cb2416d5b7b4477a4186ae70967159b9d5ccd61be890303f7e3da66f8f1a590ad27be545afd49c18edfac88729f0e626bf9387ac8db7a053195335e9b5f1ebe27451fae2927c47f6e6e8f884fe958343f92c350dcdcc8de2786e9b9b4431219de13341868c8584151b8ce0500c2955dde1995d31b3f32a698c4a265417d613a4d8d89f70fff93f3fa12f1b0b890fddc97c6f074892061891911ca872553833d0a6ce24464c3bb53a6e9a4346f"], 0x1, 0x1) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) syz_open_procfs(0x0, &(0x7f0000000000)='io\x00') epoll_create(0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vga_arbiter\x00', 0x2000, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3a8, 0x0) write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) pipe2(&(0x7f0000000100), 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000080)={{0x2, 0x0, @empty}, {0x4000030000000304}, 0x0, {0x2, 0x0, @empty}, 'teql0\x00\t\x00'}) r3 = socket(0x10, 0x3, 0x0) write(r3, &(0x7f000018efdc)="2400000052001f0014f9f407000904000200", 0x12) socket(0x10, 0x0, 0x0) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r5, 0x0, 0x0) ptrace(0x4207, r5) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) socket(0xa, 0x5, 0x0) 03:35:11 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(0xffffffffffffffff, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:35:11 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x77}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) 03:35:11 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_SET_IRQCHIP(r2, 0xc208ae62, &(0x7f0000000300)={0x2}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x3b2, 0x0) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0xd, 0x2, {{0x20, 0x1, 0x6}, 0xffff}}, 0x18) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 564.863616] ptrace attach of "/root/syz-executor.1"[6836] was attempted by "/root/syz-executor.1"[20129] 03:35:11 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r2, 0x8200) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r3, 0x0, 0x400) sendfile(r0, r1, 0x0, 0x8000fffffffe) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) 03:35:11 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x77}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 565.053692] print_req_error: I/O error, dev loop0, sector 0 [ 565.089970] ptrace attach of "/root/syz-executor.1"[6836] was attempted by "/root/syz-executor.1"[20119] 03:35:11 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x77}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 565.109360] ptrace attach of "/root/syz-executor.4"[18692] was attempted by "/root/syz-executor.4"[20127] 03:35:11 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_SET_IRQCHIP(r2, 0xc208ae62, &(0x7f0000000300)={0x2}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x3b2, 0x0) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0xd, 0x2, {{0x20, 0x1, 0x6}, 0xffff}}, 0x18) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 565.139358] audit: type=1804 audit(2000000111.830:239): pid=20144 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir274301871/syzkaller.J3IJvh/2/bus" dev="sda1" ino=16899 res=1 03:35:11 executing program 1: r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000000000)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100), 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r2 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r2, 0x0, 0x8000fffffffe) 03:35:12 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x77}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) [ 565.269165] audit: type=1804 audit(2000000111.880:240): pid=20144 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.5" name="/root/syzkaller-testdir274301871/syzkaller.J3IJvh/2/bus" dev="sda1" ino=16899 res=1 03:35:12 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x77}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) 03:35:12 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_SET_IRQCHIP(r2, 0xc208ae62, &(0x7f0000000300)={0x2}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x3b2, 0x0) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0xd, 0x2, {{0x20, 0x1, 0x6}, 0xffff}}, 0x18) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) 03:35:12 executing program 4: openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0401273, &(0x7f0000000180)={[], 0x0, 0x10003, 0x1, 0x200}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0401273, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$KVM_PPC_GET_PVINFO(r1, 0x4080aea1, &(0x7f0000000240)=""/219) ioctl$BLKTRACESETUP(r0, 0xc0401273, &(0x7f0000000140)={[], 0x9, 0xdf, 0x4, 0x2, 0x57ea}) [ 565.407968] audit: type=1804 audit(2000000111.880:241): pid=20144 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir274301871/syzkaller.J3IJvh/2/bus" dev="sda1" ino=16899 res=1 03:35:12 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x77}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) 03:35:12 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, 0x0, 0x0) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:35:12 executing program 1: r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000000000)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100), 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r2 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r2, 0x0, 0x8000fffffffe) 03:35:12 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000a00)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(r0, 0x5382, &(0x7f0000000a40)) 03:35:12 executing program 4: futex(&(0x7f0000000b80)=0x2, 0x0, 0x2, &(0x7f0000000bc0)={0x0, 0x989680}, 0x0, 0x0) 03:35:12 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xd, 0xe, 0x4, 0x1, 0x0, r0}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000001c0), &(0x7f0000000080), 0x2}, 0x20) 03:35:12 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_SET_IRQCHIP(r2, 0xc208ae62, &(0x7f0000000300)={0x2}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x3b2, 0x0) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0xd, 0x2, {{0x20, 0x1, 0x6}, 0xffff}}, 0x18) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:35:12 executing program 1: clone(0x2000922100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0xa, 0x3, 0x80, 0x6, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x1}, 0x3c) pipe2(0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) [ 565.847952] audit: type=1804 audit(2000000112.540:242): pid=20197 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.5" name="/root/syzkaller-testdir274301871/syzkaller.J3IJvh/2/bus" dev="sda1" ino=16899 res=1 [ 565.875004] audit: type=1804 audit(2000000112.550:243): pid=20144 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir274301871/syzkaller.J3IJvh/2/bus" dev="sda1" ino=16899 res=1 [ 565.909511] audit: type=1804 audit(2000000112.550:244): pid=20160 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir274301871/syzkaller.J3IJvh/2/bus" dev="sda1" ino=16899 res=1 03:35:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x80400000000002, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x8, 0x80000000000024d, &(0x7f0000000400)=[{}, {}], 0x0) r1 = memfd_create(&(0x7f0000000340)='-self&)vboxn\x00', 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000400)='/dev/vcs#\x00', 0x8, 0x0) io_submit(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x812, r1, 0x0) io_submit(r0, 0x1, &(0x7f0000001280)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x101000, 0x192) 03:35:12 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r0, 0xae03, 0x139) 03:35:12 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f00000006c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x9084000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0x70bd2c, 0x25dfdbfc}, 0x1c}, 0x1, 0x0, 0x0, 0x20000001}, 0x840) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TIOCGSERIAL(r2, 0x541e, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TIOCGSERIAL(r3, 0x541e, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCADDDLCI(r3, 0x8980, &(0x7f00000003c0)={'erspa\xee\x00', 0xffff}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000700)={'team0\x00', 0x200}) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r4, 0x6, 0x15, 0xfffffffffffffffe, 0xfffffffffffffda3) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_tcp_int(r4, 0x6, 0x10000000013, &(0x7f0000d06000), 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000300)='veth1\x00', 0x10) connect$inet(r4, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r5, 0x1, 0x1, &(0x7f0000000c40), 0x4) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=0x1000, 0x0, 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x1}, 0x0, 0x0, &(0x7f0000000500)={0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x5b8) r6 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r6, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) connect$inet(r6, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) setsockopt$inet_tcp_int(r6, 0x6, 0xa, &(0x7f0000000100)=0xffffffffffffffff, 0x1ee) tee(r5, r4, 0xffffffbffffffffd, 0x5) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000900)=ANY=[@ANYBLOB="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"/827]) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000000040)={0x0, 0x1, 0x7ffb, 0xfffffffffffffffc}, 0x14) shutdown(r6, 0x1) 03:35:12 executing program 1: syz_open_dev$evdev(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000280)='veth0_to_bond\x00', 0x10) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040), 0x5b) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000740)={0x0, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e22, @rand_addr=0xd3}, {0x2, 0x4e24, @loopback}, 0x120, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000080)='gretap0\x00', 0x3673aa9f, 0x8, 0x9}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$revoke(0x3, r3) keyctl$unlink(0x6, r3, 0x0) keyctl$unlink(0x6, 0x0, 0x0) r4 = add_key(&(0x7f0000000680)='syzkaller\x00', &(0x7f00000006c0)={'syz', 0x1}, &(0x7f0000000700)="4819372d750aedcaa432aa6e435272096fa35b86f6849211a58b4321e1afda25fa70ba63ff7ca0d83bbfd710657db7f1", 0x30, 0x0) keyctl$instantiate_iov(0x14, r3, &(0x7f0000000640)=[{&(0x7f0000000180)="cb2b5fbad9fe550f14d225717a677e072e21637e4560c15ac5cd5596c7b33166a849fde0c61a", 0x26}, {&(0x7f00000001c0)="5ac3973eb9c6191790baca60335315a182c67fad3a0d2eae2824050286cda96ef832084a4d99fe66052a8a271c708e3b7deb7d1d4bfdf819b2", 0x39}, {&(0x7f00000002c0)="caca2019eef1bbfa03de0e187e6ab0172b20cddc6e20ecaf971c6751c9fef8a13233553c37d0e033bdaba1fb2bf30a96174f9a9ee9a9c6bec14f419959e58068a005bf0bfabddb2a31b0cd7e21ba2edadb12b2ef4e2137418ad9a72d6b52166c08718bc3da07581786988e054e2b78a861f2d787af9033953fead1df330b24b709edc44d52e52d23778d93b869551ac2337335eeb34ba310efbd016473791af1b1c02f803acabf69d4a0d330b90e01b54b2e9b42d3c9405b7ecdf1435e232648cf722a33dbe718def5c80603c668ce", 0xcf}, {&(0x7f00000003c0)="68d7ed048cfc1dd6f38f437730ef95d21433a950bd5fde6370b382186e4ceac2112db665a29e5d3f77705f5849758c90cd11c7d6626e50b99a3a4f53723a5f76ec93dd91ff3fbaa9fdf10821bb31de84606886cebec25157", 0x58}, {&(0x7f00000004c0)="3cfef915297a46ba6e3d1b2d1041b7d2f9fdd6a8057f154175bb90bec0bf13bf275cbae670caa22bcd5300b219c67739e57e1a3f8b43d6978e6d61ca3a85a6d10d43b050efdf34f773bbe27c63205f988ca18b3afa5e77e0cc4101fce534cde973f5f24cc3e55a7ca162610c11cec113cac94d326c58d6da48cf35f1db4340ad8d5fa1dc07acc430a5da64f80854d3484bf0582f171d1f23c404e86ef097062774203633f55b11", 0xa7}, {&(0x7f0000000240)="cd6216853726e7ab4c5cbe9aa6e5bb2b558a71f68ca5042e9c123cf16da2fa", 0x1f}, {&(0x7f0000000580)="28df091d646d99d3dd9da937e6569b665d9e15a0b761e3382f198d36dfaf465674cfb905d4c08dacd381ee84f425e22f067cf8d08006ff4125b6f5ea1315f48587bec5c7a6a20323a05196b649a9ba07ab2e8d", 0x53}, {&(0x7f0000000600)="b046cad54ae0618eaa817abbc3f2cd40da24", 0x12}], 0x8, r4) dup(r2) setsockopt$inet6_int(r1, 0x29, 0x2, &(0x7f00000000c0)=0xfef, 0x4) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCGABS0(r5, 0x80184540, &(0x7f0000000540)=""/93) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r5, 0x4010ae74, &(0x7f0000000000)={0x500000, 0x100, 0x6}) listen(r1, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r6, 0x0, 0x9c27f8819ac3a180, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r7 = accept4(r1, 0x0, 0x0, 0x80800) sendto$inet6(r7, &(0x7f00000000c0), 0xffffffeb, 0x13, 0x0, 0xfffffffffffffdf0) [ 565.990114] net_ratelimit: 22 callbacks suppressed [ 565.990121] protocol 88fb is buggy, dev hsr_slave_0 [ 566.000189] protocol 88fb is buggy, dev hsr_slave_1 03:35:12 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_SET_IRQCHIP(r2, 0xc208ae62, &(0x7f0000000300)={0x2}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x3b2, 0x0) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0xd, 0x2, {{0x20, 0x1, 0x6}, 0xffff}}, 0x18) [ 566.080141] protocol 88fb is buggy, dev hsr_slave_0 [ 566.085276] protocol 88fb is buggy, dev hsr_slave_1 [ 566.090443] protocol 88fb is buggy, dev hsr_slave_0 [ 566.095717] protocol 88fb is buggy, dev hsr_slave_1 [ 566.139956] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 566.390118] protocol 88fb is buggy, dev hsr_slave_0 [ 566.395379] protocol 88fb is buggy, dev hsr_slave_1 [ 566.415055] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:35:13 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, 0x0, 0x0) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:35:13 executing program 4: setreuid(0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x14102, 0x0) ioctl$KVM_SET_CPUID2(0xffffffffffffffff, 0x4008ae90, &(0x7f0000000280)=ANY=[@ANYBLOB]) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) msgget$private(0x0, 0x10) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x4, 0x1012, r2, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x1c, 0x0, 0x400, 0x70bd25, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x26048180}, 0x0) write$P9_RWALK(r2, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r2, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r2, r3) open(0x0, 0x0, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, 0xffffffffffffffff, 0x0) 03:35:13 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x2000000000adb0) setsockopt$sock_int(r0, 0x1, 0x24, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000180), 0x1c) listen(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000180)='blacklist\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0x0) request_key(&(0x7f0000000340)='user\x00', &(0x7f0000000380)={'syz', 0x0}, &(0x7f00000003c0)='(^\x00', 0xfffffffffffffffe) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3ff0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) tkill(0x0, 0x0) ioctl$TIOCSERGETLSR(0xffffffffffffffff, 0x5459, &(0x7f00000000c0)) write$P9_RCREATE(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x6, 0x20000) sendmsg$nl_netfilter(r1, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10012004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x18, 0x4, 0x1, 0x0, 0x70bd2a, 0x25dfdbfc, {0xc, 0x0, 0xa}, [@typed={0x4, 0x4a}]}, 0x18}, 0x1, 0x0, 0x0, 0x10}, 0x2004012) r2 = gettid() timer_create(0x0, &(0x7f0000001ec0)={0x0, 0x12}, &(0x7f00009b1ffc)) openat$dir(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x0, 0x0) tkill(r2, 0x15) open$dir(&(0x7f0000000540)='./file0\x00', 0x27e, 0x0) 03:35:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x8000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'ip6gre0\x00'}) r0 = socket(0x10, 0x80803, 0x0) write(r0, &(0x7f0000000200)="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", 0x505) 03:35:13 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x0, 0x0) dup2(r0, r1) 03:35:13 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_SET_IRQCHIP(r2, 0xc208ae62, &(0x7f0000000300)={0x2}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x3b2, 0x0) 03:35:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x16, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}}, 0x0) 03:35:13 executing program 1: clone(0x2000922100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6d, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=ANY=[@ANYBLOB="680000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000048001200100001006970366772657461700000003400020014000600fe8000000000000000000200000000aa14000700fe8000000000000000000000000000aa08000100", @ANYRES32], 0x68}}, 0x0) [ 566.559481] netlink: 180 bytes leftover after parsing attributes in process `syz-executor.0'. 03:35:13 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b7020000f7ffffffbfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e342b66b249b35e029184e290b39a6f2fc2a5e019bd9690000f002cf57bf887e0243c1145b8a34e6bdc4dc1af6d3c6958da4bddac602e0502aec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8f61e1574f21a5f03dff2c779bf342055ea309c9c7c6607b5a9004d5271b41be073657d3d439e8134c0f9413e0c53fbec2f1add5694dfc3fc201c6b1c22876921d414cfa9270d556a033d0cea20eb522fce4f95d9d21f5f8d9a863314835e8cc7f34f9cc41d25f2299fbae4492b8bd580e61b7bc945255bd8cbf9aaaf7f0d16f78b490cf3007ca"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_SET_IRQCHIP(r2, 0xc208ae62, &(0x7f0000000300)={0x2}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) [ 566.614869] netlink: 180 bytes leftover after parsing attributes in process `syz-executor.0'. 03:35:13 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x3, 0x2000002) write$evdev(r0, &(0x7f0000000000)=[{{0x0, 0x2710}, 0x1, 0x5f, 0x2}], 0x4680) [ 566.684357] batman_adv: Cannot find parent device [ 566.696837] syz-executor.5 (20243) used greatest stack depth: 22992 bytes left 03:35:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x8000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'ip6gre0\x00'}) r0 = socket(0x10, 0x80803, 0x0) write(r0, &(0x7f0000000200)="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", 0x505) 03:35:13 executing program 4: socket$inet(0x2, 0x0, 0x81) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000180), 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f00000000c0)={'NETMAP\x00'}, 0x0) r0 = creat(&(0x7f0000001380)='./file0\x00', 0x0) write$P9_RREMOVE(r0, &(0x7f0000000280)={0x1}, 0xffffffffffffff2a) open(0x0, 0x10000000141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_GET_TIMERSLACK(0x1e) pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000140)='./file0/file0\x00', 0xfffffffffffffff9, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="ad0c5eedb4cbe15cc2a95501edd66bc47314800c0ca716b62a8845", 0x1b, 0x8000}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="6130313030d347ba8794460b4b743030303030303030303030313233302c646f74732c646f74731a6f626a5f757365723d4e45544d4150002ce5c73ad8f0790f94061131e37c076f626a5f726f6c653d4e45544d4150002c6673636f6e74"]) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fdatasync(r0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz0\x00', 0x200002, 0x0) 03:35:13 executing program 5: pipe2(0x0, 0xffe21e66ec54393b) ioctl$KVM_SET_NESTED_STATE(0xffffffffffffffff, 0x4080aebf, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20000000000000, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0xcc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cuse\x00', 0x2, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24000000) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000100)='NET_DM\x00') ioctl$LOOP_CLR_FD(r0, 0x4c01) r3 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x2000, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x4, 0x10000) ioctl$MON_IOCX_MFETCH(r4, 0xc00c9207, &(0x7f00000000c0)={&(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3, 0xffff}) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="1300000065ff822e00001c0600395032303030"], 0x13) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r5, 0x0, r6, 0x0, 0x200, 0x0) close(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x200, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f0000000440)=ANY=[@ANYPTR=&(0x7f0000001680)=ANY=[@ANYBLOB="25d336cf0628829dbda1cc2346", @ANYRES32=r2, @ANYBLOB="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", @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRES16=r5], @ANYPTR, @ANYPTR64=&(0x7f0000000380)=ANY=[]], @ANYRES16, @ANYRESOCT, @ANYRES64, @ANYRES32, @ANYRESDEC]) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, &(0x7f0000000280)=ANY=[@ANYBLOB="0a00000001000000feffffff000000000180000000000000000000000000000001000000010000000400000000001500a800000000000001000000ff07000000000000ff0700000000"]) r7 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') preadv(r7, &(0x7f0000000480), 0x10000000000001e2, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) [ 566.785031] netlink: 180 bytes leftover after parsing attributes in process `syz-executor.0'. [ 566.992781] print_req_error: I/O error, dev loop0, sector 0 [ 566.998600] buffer_io_error: 505 callbacks suppressed [ 566.998606] Buffer I/O error on dev loop0, logical block 0, lost async page write [ 567.011949] print_req_error: I/O error, dev loop0, sector 4 [ 567.017716] Buffer I/O error on dev loop0, logical block 1, lost async page write [ 567.025777] print_req_error: I/O error, dev loop0, sector 8 [ 567.032312] Buffer I/O error on dev loop0, logical block 2, lost async page write [ 567.042541] print_req_error: I/O error, dev loop0, sector 12 [ 567.048409] Buffer I/O error on dev loop0, logical block 3, lost async page write [ 567.056396] print_req_error: I/O error, dev loop0, sector 16 [ 567.062384] Buffer I/O error on dev loop0, logical block 4, lost async page write [ 567.070407] print_req_error: I/O error, dev loop0, sector 20 [ 567.076414] Buffer I/O error on dev loop0, logical block 5, lost async page write [ 567.084294] print_req_error: I/O error, dev loop0, sector 24 [ 567.090176] Buffer I/O error on dev loop0, logical block 6, lost async page write [ 567.090205] print_req_error: I/O error, dev loop0, sector 28 [ 567.100486] print_req_error: I/O error, dev loop0, sector 32 [ 567.103853] Buffer I/O error on dev loop0, logical block 7, lost async page write [ 567.109626] Buffer I/O error on dev loop0, logical block 8, lost async page write [ 567.117304] Buffer I/O error on dev loop0, logical block 9, lost async page write [ 567.190402] protocol 88fb is buggy, dev hsr_slave_0 [ 567.195610] protocol 88fb is buggy, dev hsr_slave_1 03:35:14 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, 0x0, 0x0) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:35:14 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r0 = memfd_create(&(0x7f0000000140)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r0, &(0x7f0000317000), 0x7f8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000001c0)='./file0\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in=@local}}, {{@in6=@initdev}, 0x0, @in6=@mcast2}}, 0x0) chown(&(0x7f00000000c0)='./file0/../file0/file0\x00', 0x0, 0x0) 03:35:14 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_SET_IRQCHIP(r2, 0xc208ae62, &(0x7f0000000300)={0x2}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:35:14 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x3}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 03:35:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100001c9, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) 03:35:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x13, 0x10, 0x6}, 0x3c) socket$inet6_udp(0xa, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000, 0xa00}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x90, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 03:35:14 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000b06090368fe07072b03003700000a0014000200450001070300001419001a00120002000e0001000a000300"/57, 0x39}], 0x1) 03:35:14 executing program 5: syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x80fe, 0x2, 0x0, 0x300], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300002, 0x4, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 03:35:14 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_SET_IRQCHIP(r2, 0xc208ae62, &(0x7f0000000300)={0x2}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) 03:35:14 executing program 5: syz_open_dev$evdev(0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000280)='veth0_to_bond\x00', 0x10) r1 = socket(0x10, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040), 0x5b) setsockopt$inet_mreqn(r0, 0x0, 0x24, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$unlink(0x6, r3, 0x0) keyctl$unlink(0x6, 0x0, 0x0) r4 = add_key(&(0x7f0000000680)='syzkaller\x00', &(0x7f00000006c0)={'syz', 0x1}, &(0x7f0000000700)="4819372d750aedcaa432aa6e435272096fa35b86f6849211a58b4321e1afda25fa70ba63ff7ca0d83b", 0x29, 0x0) keyctl$instantiate_iov(0x14, r3, 0x0, 0x0, r4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x9c27f8819ac3a180, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r6 = accept4(r2, 0x0, 0x0, 0x80800) sendto$inet6(r6, &(0x7f00000000c0), 0xffffffeb, 0x13, 0x0, 0xfffffffffffffdf0) [ 567.669343] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.4'. 03:35:14 executing program 4: ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000200)=""/162) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) eventfd(0x0) r0 = eventfd(0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = eventfd(0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000080)={r0, 0x0, 0x2, r3}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x0, &(0x7f00000000c0)="0800a1695e1dcfe87b") r5 = eventfd(0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000080)={r5, 0x0, 0x2}) eventfd(0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) eventfd(0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x4008700c) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x4008700c) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x4008700c) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r7, 0x4008700c) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', 0x0, &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYPTR, @ANYPTR]) syz_open_procfs(0x0, 0x0) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='pids.events\x00', 0x275a, 0x0) r9 = creat(0x0, 0x0) fallocate(r8, 0x0, 0x0, 0x9) fallocate(r8, 0x0, 0x0, 0x110001) ioctl$TIOCGLCKTRMIOS(r9, 0x5456, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1ff, 0xe, 0x0, 0x3, 0x0, 0x400, 0x9, 0x1}) getegid() r10 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x81805) ioctl$LOOP_CHANGE_FD(r10, 0x4c00, 0xffffffffffffffff) sendfile(0xffffffffffffffff, r10, 0x0, 0x24000000) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, 0x0, 0x0) r11 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB="200000001e0001000000", @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 03:35:14 executing program 1: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 567.855566] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 568.111070] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:35:15 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b7020000f7ffffffbfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e342b66b249b35e029184e290b39a6f2fc2a5e019bd9690000f002cf57bf887e0243c1145b8a34e6bdc4dc1af6d3c6958da4bddac602e0502aec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8f61e1574f21a5f03dff2c779bf342055ea309c9c7c6607b5a9004d5271b41be073657d3d439e8134c0f9413e0c53fbec2f1add5694dfc3fc201c6b1c22876921d414cfa9270d556a033d0cea20eb522fce4f95d9d21f5f8d9a863314835e8cc7f34f9cc41d25f2299fbae4492b8bd580e61b7bc945255bd8cbf9aaaf7f0d16f78b490cf3007ca"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_SET_IRQCHIP(r2, 0xc208ae62, &(0x7f0000000300)={0x2}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) 03:35:15 executing program 0: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = epoll_create1(0x0) r1 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) timerfd_settime(r1, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r0, &(0x7f0000000180)=[{}], 0x1, 0xfffffffffffffff8, 0x0, 0xfffffffffffffd6e) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000000)={0x19}) 03:35:15 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x9, 0x4, &(0x7f00000001c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x18, 0x1, 0x2c}]}, &(0x7f0000f6bffb)='\xd5$\xe8\x83', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x20000000000c, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 03:35:15 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:35:15 executing program 4: prctl$PR_SET_SECUREBITS(0x1c, 0x5) setregid(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, 0x0) syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100)}], 0x1, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_genetlink_get_family_id$SEG6(0x0) ioctl$KVM_GET_LAPIC(r3, 0x8400ae8e, &(0x7f00000004c0)={"95af7b9d293729574cd7428c3911d448c3c8fd613dbf9bef8486738f65d0dd69e081a8188ae83e1e97f47a9d2cbfb1cbb23c1e3e751f15f3605c8ff6f6aa75f9f142f9ff1ba9b3ca0c2911d453f9c703312fa5cb6c34594e9e8fd9184225ac5a6dbb8bb6e55bbb8565d2c0ce50dca664d79381e4cd6cae77d186dc0f56a64c77fc741b0bac2ba2442d695583a338c873b204e2b51fefa5d42200486d1d40bc92195576e586983bb111a559f32177724e53cd8b81f7744d671361a388df8af6775ae8cffa9ff177085e60d6bb8e92030b67fbff66cbbb307c8c79ae680f326164be1ebe87fbd0aab7bafe0ec35026cefadcb12038916a1b1eea1b4ce5a3ac870d8898dc92fe2e8ce05370b51e3a33faf8c67da62480b8674b5eff1cfb68bda49e67f49928f67202703c25638391258f2ce074b3801687d04186532f6a9ec1a27bb9ef361b9f4797870cb0b43c6ca5b928d1b0ef61f7e855839d9ec3da76963b48ceb011141c9463fe04e936aa413983bbabb8bd097637c2b192c1b34785d2a058a814a5b9c4ad9c1b5d71af8f0522dde3eff74a9ccccc1f4a25a0ccc4d0a20e0291f116d2874ba284a0aa4ee239cb2597e069effbe1da90075bafea9628d0cd1c99568cb1437df5e00215107eb15227a95850b6424b59fa4762ac74f19b04c19d501734136c2099fa153d20060f4aee024018ae0f106a20472804053c43429b4eaf7bb5c2c63e255783c722b99f699d20e715e6b12d533b40ee27b09214bf14804700e8177bda9b0f3806ccaff6e0631966045896d5cefd9d5ecce254bb93ccaaba9910f136cce89b6142079c691392cb0a08f602907bde80ff806867a78e5d4ed84d4e19992040a15bdf2afdeb4bdefe10cb124ed4b783e88577799c7b1fa2633d53d047f1b45559a60c5fdf06379d5295c7531ad9d9a1fd78ed67a5397b1bcf26e9f7664680962c7437741fbe98a53f3137bc8207e199401379c29007e52692536c20d4569d5ff6da1c7e3b72cf35a4b01a3a5a1ef1f5c766de246624fdc9231d735b636ded9e28b0b82f172a637874a133cc530211f4bbfa5eaa3e46cbdc0858b6fe35a74c1c32ed81f726b3b690ef1c3afdad3713a639b82750024496e1f709b71086a2a45c9aa0c5e23e2517cb7b7c4766b3d3ac562888e66fdbe258452138258c54668086b89c6c90337a898da85bdbd2a25b51ead2b7ae28aa49f0201a63e69bf5301c5b31f0b49ea29aa18623cc7e71ced2006b9ea178da92ba90e945f3a9f309c0d628bf0de8fa0ac10b4b82d7f0d4e6cec1f6dbadd576fda1a8b35741cbe2f2617061adad2d29d34bf3a4ed7f164bee4e9b0333ca3811ebb6f9e074f0434bd9166bdf9d2a4a2404ca8aa1d14a1075960b184ef1b78e63040d1327ddb955d4fe08bb0d5238156d298902e1b91b680f272f8d38c3c87d7d00ba38650a"}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 03:35:15 executing program 5: syz_open_dev$evdev(0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000280)='veth0_to_bond\x00', 0x10) r1 = socket(0x10, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000040), 0x5b) setsockopt$inet_mreqn(r0, 0x0, 0x24, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$unlink(0x6, r3, 0x0) keyctl$unlink(0x6, 0x0, 0x0) r4 = add_key(&(0x7f0000000680)='syzkaller\x00', &(0x7f00000006c0)={'syz', 0x1}, &(0x7f0000000700)="4819372d750aedcaa432aa6e435272096fa35b86f6849211a58b4321e1afda25fa70ba63ff7ca0d83b", 0x29, 0x0) keyctl$instantiate_iov(0x14, r3, 0x0, 0x0, r4) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x9c27f8819ac3a180, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r6 = accept4(r2, 0x0, 0x0, 0x80800) sendto$inet6(r6, &(0x7f00000000c0), 0xffffffeb, 0x13, 0x0, 0xfffffffffffffdf0) 03:35:15 executing program 1: r0 = socket$inet(0x2, 0x3, 0x19) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x1600bd74, 0x0, 0x0) 03:35:15 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000200000002, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffae, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 03:35:15 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_SET_IRQCHIP(r2, 0xc208ae62, &(0x7f0000000300)={0x2}) [ 568.539717] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:35:15 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_NESTED_STATE(0xffffffffffffffff, 0x4080aebf, 0x0) r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) vmsplice(r0, &(0x7f0000000640)=[{&(0x7f0000000040)="6d95a45b5e5a805d65d5863cb3bd3688c3c34a38eeb08c33c3f6924ff6b3cd1f87caee8044ef7ecbad21694d26213fa50682c97be69f54301f637146c2f0236c57c27f9795b2e5f5e9acbdd1d3db7c2f8e626c56ff9e25c8880360450276acd83f1da6a8c382a2d192c08989a74b597c8c86b8900ec4851a54e623e074ac34b71b9665b6bb795bc5e85bf4935c1e4611cfaab728ced7e8f20a688fc5b03fdbff34e332c9ae7428993684632163e55b3fc1614f58ca91f1c2a01392c8a94cd95c682974509e1ef7d29f97cfe980f653ef85cd5e83c9c1197fc8f068eebb61150209ea99e793946baa", 0xe8}, {&(0x7f0000000380)="21b2dc99416dc2bc50efa01c0ef23caa0ec9da16ef942658e7b2655f8936a35ebb626ddf5242048a1221c50c30a944e5daccce5b5341750f809cfe521036db1b21c9bd7242b5f0dce72ed47f3b7a95897a550f23ad0ede6a54ddf39f67b3028bc3180595b3bee88dcdddce9d89acb0404bff51895cda3aca95dbf553c040ada29475a4a0533d1db5932bd0fafc37cd2622c5ee55340dd3959f0fa83bbb26b56d8dcfd79822c6276a28f53fed87d0", 0xae}, {&(0x7f0000000180)}, {&(0x7f00000005c0)="033ab823ba59056c98c15cfaaf83746c6503c6708d6ff539624ad5fb80213f9715bbea55311171bba52b1cc20dd11f5587758de634bbcbbe2e9594b0f302e822c8d77f01b471832d10278f987b399c6e1b4f5b04ed00099786409346d2aaf2f6f12235f77d2995b29661d6f1518c680e79662a88a751399d004e0127ed7f16", 0x7f}], 0x4, 0x0) r2 = fcntl$dupfd(r1, 0xc0a, r1) ioctl$LOOP_CLR_FD(r2, 0x4c01) clock_gettime(0x0, &(0x7f0000000940)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$LOOP_GET_STATUS64(r3, 0x4c05, &(0x7f00000004c0)) sendfile(r3, r3, 0x0, 0x24000000) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='|\x00\x00\x00', @ANYRES16, @ANYBLOB="350226bd7000c4dbdf250900000008000600070000002800010008c550d15100000014000300ac1414aa0000000000000000000000000800090068000000080005000900000008000400090000000800050001000000080004007f0000000800050007400000080004000900000008000600ff010000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x10000025) ioctl$LOOP_CLR_FD(r3, 0x4c01) dup(0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./file0\x00', 0x88) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000680)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r5, &(0x7f0000000140)='./file0\x00', r6, r7, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x402c5828, &(0x7f0000000180)={0x0, 0x4, 0x28e, 0xffffffffffffff7f}) bind$netlink(0xffffffffffffffff, &(0x7f00000006c0)={0x10, 0x0, 0x25dfdbfe, 0x206c041}, 0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) 03:35:15 executing program 0: creat(&(0x7f0000000080)='./file1\x00', 0x0) lsetxattr$security_smack_transmute(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x0) lsetxattr$security_smack_transmute(&(0x7f0000000380)='./file1\x00', &(0x7f0000000400)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x0) 03:35:15 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) 03:35:15 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BLKGETSIZE(r1, 0x1260, &(0x7f00000000c0)) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000002bc0)='./file0\x00', 0x40c2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000b00)={0x20, 0x1, 0x2, 0x7, 0x7}) getpeername$packet(r1, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000005c0)=0x14) keyctl$set_timeout(0xf, 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f00000001c0)=0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@multicast2}}}, 0x0) getgroups(0x2, &(0x7f0000001900)=[0xee00, 0x0]) lstat(0x0, 0x0) getegid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000002, 0x100010, r0, 0x0) r4 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000000)={0x18}, 0x18) splice(r0, 0x0, r4, &(0x7f0000000a80), 0xa7, 0x4) write(r3, &(0x7f0000000600)='4', 0x4100) ioctl$KVM_GET_LAPIC(r1, 0x8400ae8e, &(0x7f0000000640)={"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"}) 03:35:15 executing program 5: pipe2(0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/121, 0x79}], 0x1}, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) writev(r1, &(0x7f00000000c0), 0x2000000000000041) 03:35:15 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) 03:35:15 executing program 0: syz_open_procfs(0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r0, 0x400, 0x0) rt_sigprocmask(0x0, &(0x7f0000da1000)={0xfffffffffffffffe}, 0x0, 0x8) rt_sigtimedwait(&(0x7f0000061000)={0xfffffffffffffffd}, 0x0, 0x0, 0x8) truncate(&(0x7f0000000080)='./file0\x00', 0x0) fcntl$setlease(r0, 0x400, 0x2) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, &(0x7f0000000240)='./file0\x00', 0x8, 0x0) [ 568.954392] audit: type=1800 audit(2000000115.650:245): pid=20393 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="file0" dev="sda1" ino=17179 res=0 [ 569.039766] audit: type=1400 audit(2000000115.650:246): avc: denied { map } for pid=20383 comm="syz-executor.4" path="pipe:[74024]" dev="pipefs" ino=74024 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=fifo_file permissive=1 03:35:16 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:35:16 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000100)="be", &(0x7f0000000400)='\a'}, 0x20) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, &(0x7f00000001c0), &(0x7f0000000440)}, 0x20) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0xc5c5614176d1badf) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) dup(0xffffffffffffffff) 03:35:16 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BLKGETSIZE(r1, 0x1260, &(0x7f00000000c0)) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000002bc0)='./file0\x00', 0x40c2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000240)) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000b00)={0x20, 0x1, 0x2, 0x7, 0x7}) getpeername$packet(r1, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000005c0)=0x14) keyctl$set_timeout(0xf, 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f00000001c0)=0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@multicast2}}}, 0x0) getgroups(0x2, &(0x7f0000001900)=[0xee00, 0x0]) lstat(0x0, 0x0) getegid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000002, 0x100010, r0, 0x0) r4 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000000)={0x18}, 0x18) splice(r0, 0x0, r4, &(0x7f0000000a80), 0xa7, 0x4) write(r3, &(0x7f0000000600)='4', 0x4100) ioctl$KVM_GET_LAPIC(r1, 0x8400ae8e, &(0x7f0000000640)={"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"}) 03:35:16 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) 03:35:16 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_NESTED_STATE(0xffffffffffffffff, 0x4080aebf, 0x0) r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) vmsplice(r0, &(0x7f0000000640)=[{&(0x7f0000000040)="6d95a45b5e5a805d65d5863cb3bd3688c3c34a38eeb08c33c3f6924ff6b3cd1f87caee8044ef7ecbad21694d26213fa50682c97be69f54301f637146c2f0236c57c27f9795b2e5f5e9acbdd1d3db7c2f8e626c56ff9e25c8880360450276acd83f1da6a8c382a2d192c08989a74b597c8c86b8900ec4851a54e623e074ac34b71b9665b6bb795bc5e85bf4935c1e4611cfaab728ced7e8f20a688fc5b03fdbff34e332c9ae7428993684632163e55b3fc1614f58ca91f1c2a01392c8a94cd95c682974509e1ef7d29f97cfe980f653ef85cd5e83c9c1197fc8f068eebb61150209ea99e793946baa", 0xe8}, {&(0x7f0000000380)="21b2dc99416dc2bc50efa01c0ef23caa0ec9da16ef942658e7b2655f8936a35ebb626ddf5242048a1221c50c30a944e5daccce5b5341750f809cfe521036db1b21c9bd7242b5f0dce72ed47f3b7a95897a550f23ad0ede6a54ddf39f67b3028bc3180595b3bee88dcdddce9d89acb0404bff51895cda3aca95dbf553c040ada29475a4a0533d1db5932bd0fafc37cd2622c5ee55340dd3959f0fa83bbb26b56d8dcfd79822c6276a28f53fed87d0", 0xae}, {&(0x7f0000000180)}, {&(0x7f00000005c0)="033ab823ba59056c98c15cfaaf83746c6503c6708d6ff539624ad5fb80213f9715bbea55311171bba52b1cc20dd11f5587758de634bbcbbe2e9594b0f302e822c8d77f01b471832d10278f987b399c6e1b4f5b04ed00099786409346d2aaf2f6f12235f77d2995b29661d6f1518c680e79662a88a751399d004e0127ed7f16", 0x7f}], 0x4, 0x0) r2 = fcntl$dupfd(r1, 0xc0a, r1) ioctl$LOOP_CLR_FD(r2, 0x4c01) clock_gettime(0x0, &(0x7f0000000940)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$LOOP_GET_STATUS64(r3, 0x4c05, &(0x7f00000004c0)) sendfile(r3, r3, 0x0, 0x24000000) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='|\x00\x00\x00', @ANYRES16, @ANYBLOB="350226bd7000c4dbdf250900000008000600070000002800010008c550d15100000014000300ac1414aa0000000000000000000000000800090068000000080005000900000008000400090000000800050001000000080004007f0000000800050007400000080004000900000008000600ff010000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x10000025) ioctl$LOOP_CLR_FD(r3, 0x4c01) dup(0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./file0\x00', 0x88) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000680)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r5, &(0x7f0000000140)='./file0\x00', r6, r7, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x402c5828, &(0x7f0000000180)={0x0, 0x4, 0x28e, 0xffffffffffffff7f}) bind$netlink(0xffffffffffffffff, &(0x7f00000006c0)={0x10, 0x0, 0x25dfdbfe, 0x206c041}, 0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) 03:35:16 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) [ 569.488358] audit: type=1800 audit(2000000116.180:247): pid=20413 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="file0" dev="loop4" ino=24 res=0 03:35:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = dup(0xffffffffffffffff) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc), 0x26d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) quotactl(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r1, 0x402c5828, &(0x7f0000000000)={0x580000, 0x0, 0x1001000200000000, 0x0, 0x0, 0x0, [0x0, 0x3800000]}) write$eventfd(r1, &(0x7f00000000c0)=0x967, 0x8) 03:35:16 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x10000803}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\n', @ifru_mtu=0x1}) 03:35:16 executing program 3: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={0xffffffffffffffff, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) 03:35:16 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='\x02\x00', 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x10600, 0x69) r0 = socket$packet(0x11, 0x3, 0x300) socket$inet(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) pipe2(&(0x7f0000000100), 0x0) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2MB.e_in_bytes\x00\x00\x00\x00\x00', 0x275a, 0x0) 03:35:16 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000280)="2e00000022004786006d20002b1f003500b00000000000000000000d4ab4268dd93f748d2d671af9336056ac3dbd", 0x128) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/89, 0x59}], 0x1) 03:35:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000000000ff, 0xfffffffffffffff8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000280)={&(0x7f0000000200)="26640f71d21ac4c3f960d179c4c3056e55b800660f380ac2c4e2e12b8c08feefffff26d8c3c4c27d33dfd9f1c4c2fd206709676f", {0x670}, 0x0, 0x0}, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) munmap(&(0x7f000001d000/0x4000)=nil, 0x4000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpid() ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r0, 0x0) ioctl$sock_netdev_private(0xffffffffffffffff, 0x89fa, 0x0) r3 = dup3(r2, r0, 0x0) setsockopt$inet6_buf(r1, 0x29, 0x0, &(0x7f0000000100), 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000000)) read(r3, &(0x7f00000000c0)=""/19, 0x2b2) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/fib_triestat\x00') ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, 0x0) preadv(r4, 0x0, 0x0, 0x0) ioctl$KVM_SET_FPU(0xffffffffffffffff, 0x41a0ae8d, 0x0) [ 569.977236] audit: type=1400 audit(2000000116.670:248): avc: denied { map } for pid=20446 comm="syz-executor.4" path="socket:[73484]" dev="sockfs" ino=73484 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=packet_socket permissive=1 03:35:17 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:35:17 executing program 3: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={0xffffffffffffffff, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) 03:35:17 executing program 1: r0 = socket(0x10, 0x800000000080002, 0x0) connect$inet6(r0, 0x0, 0x0) 03:35:17 executing program 5: getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000140)) mprotect(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 03:35:17 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x8) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000b82000)={0x10000004}) sendmmsg$unix(r2, &(0x7f00000bd000), 0x523, 0x0) epoll_wait(r3, &(0x7f0000000040)=[{}], 0x1, 0x20000000200000) dup2(r0, r1) 03:35:17 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3}, 0xffffffffffffffb9) migrate_pages(0x0, 0x81, &(0x7f0000000180), 0x0) 03:35:17 executing program 1: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_SUPPORTED_CPUID(0xffffffffffffffff, 0xc008ae05, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') getdents64(r1, &(0x7f0000000000)=""/60, 0x3c) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000040)={r0, 0x0, 0x5}) socket(0x0, 0x0, 0x0) clock_nanosleep(0x0, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) flistxattr(0xffffffffffffffff, &(0x7f0000000680)=""/79, 0x4f) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x8) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) 03:35:17 executing program 3: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={0xffffffffffffffff, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) 03:35:17 executing program 4: pipe(&(0x7f00000001c0)) mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREAD(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x402c5828, 0x0) nanosleep(0x0, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$caif_stream(0x25, 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x00\x00\x05\x00', 0x4001}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000100)={'lo\x00\x0f\x00\x00\x00\xff\xff\xfd\xfd\x00', {0x2, 0x0, @local}}) open$dir(&(0x7f0000000740)='./file0\x00', 0x4002, 0x0) truncate(0x0, 0x0) 03:35:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000002d80), 0x400000000000071, 0x1a002, &(0x7f0000000180)={0x77359400}) sendmsg$nl_generic(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="11000000420005b50000003525e88c93000000000000ed623c087d41eeba6c940550ac495fbd1b2dc440ed5a19846b1d9ada14fd9a087c4b9d5f8e1656e376a8cbd0cd3712000000005c0f36eaaa4e86f0d60170cb43b2d884420753bab52f14a235abcfa211606d01d896da739eb7cdacd108fa0d1ce1bc6a2022c61bbdd45a8aa027ab3a27f2bccab21eaa8b074ed2c7822ea677266ef5c6a3ad950fdd2e1693"], 0x14}}, 0x0) 03:35:17 executing program 3: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) 03:35:17 executing program 0: syz_open_dev$vcsn(0x0, 0x0, 0x0) getpgrp(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x5b6b) sendto$inet(r1, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) [ 570.826775] audit: type=1800 audit(2000000117.520:249): pid=20498 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="file0" dev="sda1" ino=17209 res=0 [ 570.877866] IPVS: ftp: loaded support on port[0] = 21 03:35:17 executing program 3: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) 03:35:17 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=0x96d1, 0x4) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) accept4(0xffffffffffffffff, &(0x7f0000000480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, &(0x7f0000000000)=0x80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0xfffffffffffffffd, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:35:17 executing program 1: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_SUPPORTED_CPUID(0xffffffffffffffff, 0xc008ae05, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') getdents64(r1, &(0x7f0000000000)=""/60, 0x3c) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000040)={r0, 0x0, 0x5}) socket(0x0, 0x0, 0x0) clock_nanosleep(0x0, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) flistxattr(0xffffffffffffffff, &(0x7f0000000680)=""/79, 0x4f) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x8) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) 03:35:17 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, 0x0, 0x0) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:35:17 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$KVM_SET_IRQCHIP(r1, 0xae03, &(0x7f0000000600)={0x0, 0x0, @ioapic={0x0, 0x0, 0x0, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x5}]}}) 03:35:18 executing program 0: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fsetxattr$security_capability(r0, &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000100)=@v2={0x2000000, [{0x932, 0x18}, {0x80000001, 0x9}]}, 0x14, 0x3) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, 0x0}, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100000010}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f00000009c0)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioprio_set$pid(0x6, 0x0, 0x7e39) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xa, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="85000000180000002400000400"/24], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000300)={&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ff2000/0xe000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff6000/0x4000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ff2000/0xe000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000200)="440a73ba7a222df5351a5ec02ddd6daa370b440cd30c12ea5a9f9fba360987e312db46ae2a9e505dd261987d0b2e52eff47e169b9daac3ea6c2e6fe4131b1881a80ea996764cc3f9b03c298a957a98b61efcdf15cd580751caae8d54e1ee1afcf37a2a8dbbae46a71b834e837d33ebf094bcddad795401f7e4c7735363d4aab5feaee52f6ba111bf43598826b1dd6c768a2225380e251ffa36015ca06f2230ac168d2b7b789134d8d8858c0d1db2c6c02f250243c11e5fd5b732cd31769649fe444f1cd80b15977afea8000e1ce76a2daa3d54ece9ac9ca255acf28f79a7b1fbafc5c8e8aefe7481", 0xe8, r1}, 0x68) r2 = socket$nl_route(0x10, 0x3, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x13}]}}}]}, 0x3c}}, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='Sm=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000060000,user_id=']) 03:35:18 executing program 3: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) [ 571.350483] net_ratelimit: 22 callbacks suppressed [ 571.350489] protocol 88fb is buggy, dev hsr_slave_0 [ 571.355656] protocol 88fb is buggy, dev hsr_slave_1 [ 571.455069] kvm [20513]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x4000006a data 0xffff04d00000000f [ 571.469947] (unnamed net_device) (uninitialized): option lp_interval: invalid value (0) 03:35:18 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) [ 571.497556] kvm [20513]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x40000038 data 0xffff04d00000000f [ 571.510119] protocol 88fb is buggy, dev hsr_slave_0 [ 571.515309] protocol 88fb is buggy, dev hsr_slave_1 [ 571.526491] (unnamed net_device) (uninitialized): option lp_interval: allowed values 1 - 2147483647 [ 571.556523] kvm [20513]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x40000006 data 0xffff04d00000000f [ 571.616683] (unnamed net_device) (uninitialized): option lp_interval: invalid value (0) [ 571.617146] kvm [20513]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x4000003e data 0xffff04d00000000f [ 571.640902] kvm [20513]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x4000000c data 0xffff04d00000000f [ 571.656403] kvm [20513]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x40000076 data 0xffff04d00000000f [ 571.664197] (unnamed net_device) (uninitialized): option lp_interval: allowed values 1 - 2147483647 [ 571.668260] kvm [20513]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x40000044 data 0xffff04d00000000f [ 571.692281] kvm [20513]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x40000012 data 0xffff04d00000000f [ 571.706831] kvm [20513]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x4000007c data 0xffff04d00000000f [ 571.724126] kvm [20513]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x4000004a data 0xffff04d00000000f [ 571.786667] kvm [20513]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x40000020 data 0xffff04d00000000f [ 571.960104] audit: type=1800 audit(2000000118.650:250): pid=20528 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="file0" dev="sda1" ino=17209 res=0 [ 572.051045] IPVS: ftp: loaded support on port[0] = 21 [ 572.230188] protocol 88fb is buggy, dev hsr_slave_0 [ 572.235512] protocol 88fb is buggy, dev hsr_slave_1 [ 572.310161] protocol 88fb is buggy, dev hsr_slave_0 [ 572.315272] protocol 88fb is buggy, dev hsr_slave_1 [ 572.320801] protocol 88fb is buggy, dev hsr_slave_0 [ 572.326086] protocol 88fb is buggy, dev hsr_slave_1 03:35:19 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x800006}]}, 0x10) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0xedc0) 03:35:19 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) 03:35:19 executing program 1: ioctl$KVM_GET_DIRTY_LOG(0xffffffffffffffff, 0x4010ae42, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000ffc000/0x3000)=nil}) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x370, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x7f, 0x0, 0xffffffffffffffff, 0x81b9, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x8001, 0x1, 0x3}, 0x0, 0x1, r1, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000002540)=""/135) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='tmpfs\x00', 0x0, 0x0) symlink(&(0x7f00000001c0)='.\x00', &(0x7f00000003c0)='./file0/../file0/file0\x00') prctl$PR_SET_FP_MODE(0x2d, 0x2) lsetxattr$system_posix_acl(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{}], {}, [{}, {0x8, 0x3}]}, 0x3c, 0x0) umount2(&(0x7f0000000080)='./file0/../file0/file0\x00', 0x0) ioctl$EVIOCSREP(r0, 0x40084503, &(0x7f00000000c0)=[0xe2b, 0x1]) 03:35:19 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000280)='veth0_to_bond\x00', 0x10) sendto$inet(r0, &(0x7f0000000080), 0xffffffffffffff02, 0x420ffe0, 0x0, 0xfffffffffffffd37) 03:35:19 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=0x96d1, 0x4) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) accept4(0xffffffffffffffff, &(0x7f0000000480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, &(0x7f0000000000)=0x80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0xfffffffffffffffd, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:35:19 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, 0x0, 0x0) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:35:19 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) 03:35:19 executing program 1: ioctl$KVM_GET_DIRTY_LOG(0xffffffffffffffff, 0x4010ae42, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000ffc000/0x3000)=nil}) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x370, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x7f, 0x0, 0xffffffffffffffff, 0x81b9, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x8001, 0x1, 0x3}, 0x0, 0x1, r1, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000002540)=""/135) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='tmpfs\x00', 0x0, 0x0) symlink(&(0x7f00000001c0)='.\x00', &(0x7f00000003c0)='./file0/../file0/file0\x00') prctl$PR_SET_FP_MODE(0x2d, 0x2) lsetxattr$system_posix_acl(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{}], {}, [{}, {0x8, 0x3}]}, 0x3c, 0x0) umount2(&(0x7f0000000080)='./file0/../file0/file0\x00', 0x0) ioctl$EVIOCSREP(r0, 0x40084503, &(0x7f00000000c0)=[0xe2b, 0x1]) [ 573.143939] kvm [20548]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x40000020 data 0xffff04d00000000f 03:35:19 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) 03:35:19 executing program 0: ioctl$KVM_GET_DIRTY_LOG(0xffffffffffffffff, 0x4010ae42, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000ffc000/0x3000)=nil}) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x370, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x7f, 0x0, 0xffffffffffffffff, 0x81b9, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x8001, 0x1, 0x3}, 0x0, 0x1, r1, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000002540)=""/135) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='tmpfs\x00', 0x0, 0x0) symlink(&(0x7f00000001c0)='.\x00', &(0x7f00000003c0)='./file0/../file0/file0\x00') prctl$PR_SET_FP_MODE(0x2d, 0x2) lsetxattr$system_posix_acl(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{}], {}, [{}, {0x8, 0x3}]}, 0x3c, 0x0) umount2(&(0x7f0000000080)='./file0/../file0/file0\x00', 0x0) ioctl$EVIOCSREP(r0, 0x40084503, &(0x7f00000000c0)=[0xe2b, 0x1]) 03:35:19 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x80040, 0x0) stat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x8000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000340)='overlay\x00', 0x40, &(0x7f00000003c0)={[{@workdir={'workdir', 0x3d, './file0'}}]}) 03:35:20 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) 03:35:20 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) lstat(0x0, 0x0) open(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000005c0)) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=@newqdisc={0x48, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8, 0x1, 'htb\x00'}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@gettfilter={0x24, 0x2e, 0x1, 0x0, 0x0, {0x0, r4, {}, {}, {0x0, 0xfff6}}}, 0x24}}, 0x0) 03:35:20 executing program 1: pipe2(0x0, 0xd9b36d668674244f) socketpair(0x0, 0x0, 0x0, 0x0) symlink(0x0, &(0x7f0000000380)='./file0\x00') ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x300, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x80) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$MON_IOCX_MFETCH(0xffffffffffffffff, 0xc00c9207, &(0x7f00000000c0)={&(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3, 0xffff}) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f00000001c0)=[0x1]) r1 = shmget(0x3, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) shmctl$IPC_RMID(r1, 0x0) shmat(r1, &(0x7f0000ffc000/0x3000)=nil, 0x7000) tkill(0x0, 0x9) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0x8, 0x2, [@gre_common_policy=[@IFLA_GRE_COLLECT_METADATA={0x4}], @gre_common_policy]}}}]}, 0x3c}}, 0x0) 03:35:20 executing program 0: syz_emit_ethernet(0x2a, &(0x7f0000000140)={@local, @local, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x2, @dev, @multicast2, @link_local, @multicast2}}}}, 0x0) 03:35:20 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) 03:35:20 executing program 4: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x4, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x2c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="020043d05d25b666cd783f4b8e1c", 0x0, 0x8e}, 0x28) [ 573.416289] overlayfs: option "workdir=./file0" is useless in a non-upper mount, ignore [ 573.444463] overlayfs: missing 'lowerdir' 03:35:20 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, 0x0, 0x0) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:35:20 executing program 0: ioctl$KVM_SET_NESTED_STATE(0xffffffffffffffff, 0x4080aebf, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x9, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20000000000000, 0x0, 0x0, 0xb6, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x8, 0xffffffff}, 0x40e4, 0xffffffff00000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cuse\x00', 0x2, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24000000) syz_genetlink_get_family_id$net_dm(0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x2000, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3a8, 0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x4, 0x10000) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="1300000065ff822e00001c0600395032303030"], 0x13) pipe(&(0x7f0000000040)={0xffffffffffffffff}) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x200, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') r3 = syz_open_procfs(0x0, 0x0) preadv(r3, &(0x7f0000000480), 0x10000000000001e2, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 03:35:20 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000040)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) 03:35:20 executing program 4: sendmsg(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="400000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000200012000c000100626f6e6400000000100002000c0000000000000e32000002"], 0x40}}, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) tkill(0x0, 0x0) r1 = inotify_init() inotify_add_watch(r1, 0x0, 0x0) 03:35:20 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x10, 0x0, &(0x7f0000000540)="8d14fb003092bd81ed4e5b534c5747c8", 0x0, 0x3c8c}, 0x28) 03:35:20 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) bpf$MAP_CREATE(0x15, &(0x7f0000003000)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2c) 03:35:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0x1c8, 0x0, &(0x7f0000000040)="b3255243c468d780360000a50000", 0x0, 0xb20c}, 0x28) 03:35:20 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000040)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) 03:35:20 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) r1 = dup(r0) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040), 0x4) bind$packet(r0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) 03:35:20 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f00001d0ffa)='ramfs\x00', 0x1000818, 0x0) creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x8) execve(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TCGETA(r0, 0x541a, &(0x7f0000000080)) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) 03:35:20 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000040)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) 03:35:20 executing program 5: clock_getres(0x2, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, 0x0, 0x0) syz_open_procfs(0x0, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f00000002c0)='./file1/file0\x00', 0x0) renameat2(r0, &(0x7f0000001700)='./file0\x00', r0, &(0x7f00000016c0)='./file1/file0\x00', 0x2) open(0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 574.357279] bond2 (uninitialized): Released all slaves 03:35:21 executing program 0: unshare(0x8000000) r0 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x401, 0x0) 03:35:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="140000005200010d00080000000000000a000000"], 0x14}}, 0x0) 03:35:21 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) 03:35:21 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x0, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:35:21 executing program 4: sendmsg(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="400000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000200012000c000100626f6e6400000000100002000c0000000000000e32000002"], 0x40}}, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) tkill(0x0, 0x0) r1 = inotify_init() inotify_add_watch(r1, 0x0, 0x0) 03:35:21 executing program 5: clock_getres(0x2, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x6, 0x0, 0x0) syz_open_procfs(0x0, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f00000002c0)='./file1/file0\x00', 0x0) renameat2(r0, &(0x7f0000001700)='./file0\x00', r0, &(0x7f00000016c0)='./file1/file0\x00', 0x2) open(0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) 03:35:21 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) 03:35:21 executing program 1: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/117, 0x75) 03:35:21 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='trusted.overlay.redirect\x00') [ 574.898774] [ 574.900442] ====================================================== [ 574.906758] WARNING: possible circular locking dependency detected [ 574.907251] kobject: '0:43' (ffff88808713acd0): kobject_add_internal: parent: 'bdi', set: 'devices' [ 574.913073] 4.14.146 #0 Not tainted [ 574.913077] ------------------------------------------------------ [ 574.913082] syz-executor.1/20668 is trying to acquire lock: [ 574.913084] (&event->child_mutex){+.+.}, at: [] perf_read+0x2c0/0x820 [ 574.913278] 03:35:21 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000000)=@fragment, 0x8) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 574.913278] but task is already holding lock: [ 574.922706] bond2 (uninitialized): Released all slaves [ 574.926145] (&cpuctx_mutex){+.+.}, at: [] perf_event_ctx_lock_nested+0x150/0x2c0 [ 574.926178] [ 574.926178] which lock already depends on the new lock. [ 574.926178] [ 574.944832] kobject: '0:43' (ffff88808713acd0): kobject_uevent_env [ 574.946411] [ 574.946411] the existing dependency chain (in reverse order) is: [ 574.946415] [ 574.946415] -> #5 (&cpuctx_mutex){+.+.}: [ 574.946437] lock_acquire+0x16f/0x430 03:35:21 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='trusted.overlay.redirect\x00') [ 574.946515] __mutex_lock+0xe8/0x1470 [ 574.953482] kobject: '0:43' (ffff88808713acd0): fill_kobj_path: path = '/devices/virtual/bdi/0:43' [ 574.957952] mutex_lock_nested+0x16/0x20 [ 574.957961] perf_event_init_cpu+0xc2/0x170 [ 574.958033] perf_event_init+0x2d8/0x31a [ 574.958052] start_kernel+0x3b6/0x6fd [ 574.997872] kobject: 'loop4' (ffff8880a4abd7a0): kobject_uevent_env [ 574.999315] x86_64_start_reservations+0x29/0x2b 03:35:21 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='trusted.overlay.redirect\x00') [ 575.008282] kobject: 'loop4' (ffff8880a4abd7a0): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 575.012716] x86_64_start_kernel+0x77/0x7b [ 575.012724] secondary_startup_64+0xa5/0xb0 [ 575.012728] [ 575.012728] -> #4 (pmus_lock){+.+.}: [ 575.012743] lock_acquire+0x16f/0x430 [ 575.012751] __mutex_lock+0xe8/0x1470 [ 575.012756] mutex_lock_nested+0x16/0x20 [ 575.012764] perf_event_init_cpu+0x2f/0x170 [ 575.012772] cpuhp_invoke_callback+0x1ea/0x1ab0 [ 575.012778] _cpu_up+0x228/0x530 [ 575.012784] do_cpu_up+0x121/0x150 03:35:21 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000000)=@fragment, 0x8) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) [ 575.012789] cpu_up+0x1b/0x20 [ 575.012835] smp_init+0x157/0x170 [ 575.012845] kernel_init_freeable+0x30b/0x532 [ 575.111069] kernel_init+0x12/0x162 [ 575.115583] ret_from_fork+0x24/0x30 [ 575.119818] [ 575.119818] -> #3 (cpu_hotplug_lock.rw_sem){++++}: [ 575.123973] kobject: 'loop4' (ffff8880a4abd7a0): kobject_uevent_env [ 575.126247] lock_acquire+0x16f/0x430 [ 575.135804] kobject: 'loop4' (ffff8880a4abd7a0): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:35:21 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='trusted.overlay.redirect\x00') [ 575.136953] cpus_read_lock+0x3d/0xc0 [ 575.136961] static_key_slow_inc+0x13/0x30 [ 575.136973] tracepoint_probe_register_prio+0x4d6/0x6d0 [ 575.161373] tracepoint_probe_register+0x2b/0x40 [ 575.166660] trace_event_reg+0x277/0x330 [ 575.171252] perf_trace_init+0x449/0xaa0 [ 575.176011] perf_tp_event_init+0x7d/0xf0 [ 575.180693] perf_try_init_event+0x164/0x200 [ 575.185827] perf_event_alloc.part.0+0xd90/0x25b0 [ 575.191337] SYSC_perf_event_open+0xad1/0x2690 03:35:21 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) [ 575.196450] SyS_perf_event_open+0x34/0x40 [ 575.201213] do_syscall_64+0x1e8/0x640 [ 575.205796] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 575.211624] [ 575.211624] -> #2 (tracepoints_mutex){+.+.}: [ 575.217641] lock_acquire+0x16f/0x430 [ 575.221970] __mutex_lock+0xe8/0x1470 [ 575.226295] mutex_lock_nested+0x16/0x20 [ 575.230884] tracepoint_probe_register_prio+0x36/0x6d0 [ 575.236690] tracepoint_probe_register+0x2b/0x40 [ 575.241975] trace_event_reg+0x277/0x330 [ 575.246623] perf_trace_init+0x449/0xaa0 [ 575.248460] kobject: 'loop4' (ffff8880a4abd7a0): kobject_uevent_env [ 575.251217] perf_tp_event_init+0x7d/0xf0 [ 575.251223] perf_try_init_event+0x164/0x200 [ 575.251229] perf_event_alloc.part.0+0xd90/0x25b0 [ 575.251236] SYSC_perf_event_open+0xad1/0x2690 [ 575.251246] SyS_perf_event_open+0x34/0x40 [ 575.258595] kobject: 'loop4' (ffff8880a4abd7a0): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 575.262313] do_syscall_64+0x1e8/0x640 [ 575.262323] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 575.262326] [ 575.262326] -> #1 (event_mutex){+.+.}: [ 575.262342] lock_acquire+0x16f/0x430 [ 575.262347] __mutex_lock+0xe8/0x1470 [ 575.262352] mutex_lock_nested+0x16/0x20 [ 575.262359] perf_trace_destroy+0x28/0x100 [ 575.262367] tp_perf_event_destroy+0x16/0x20 [ 575.262373] _free_event+0x330/0xe70 [ 575.262378] free_event+0x38/0x50 [ 575.262384] perf_event_release_kernel+0x364/0x880 [ 575.262388] perf_release+0x37/0x50 [ 575.262395] __fput+0x275/0x7a0 [ 575.262405] ____fput+0x16/0x20 [ 575.356257] task_work_run+0x114/0x190 [ 575.360646] exit_to_usermode_loop+0x1da/0x220 [ 575.365738] do_syscall_64+0x4bc/0x640 [ 575.370130] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 575.375818] [ 575.375818] -> #0 (&event->child_mutex){+.+.}: [ 575.382047] __lock_acquire+0x2cb3/0x4620 [ 575.386793] lock_acquire+0x16f/0x430 [ 575.391116] __mutex_lock+0xe8/0x1470 [ 575.395440] mutex_lock_nested+0x16/0x20 [ 575.400009] perf_read+0x2c0/0x820 [ 575.404057] __vfs_read+0x105/0x6a0 [ 575.408209] vfs_read+0x137/0x350 [ 575.412168] SyS_read+0xfd/0x230 [ 575.416037] do_syscall_64+0x1e8/0x640 [ 575.420428] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 575.426118] [ 575.426118] other info that might help us debug this: [ 575.426118] [ 575.434240] Chain exists of: [ 575.434240] &event->child_mutex --> pmus_lock --> &cpuctx_mutex [ 575.434240] [ 575.444817] Possible unsafe locking scenario: [ 575.444817] [ 575.450854] CPU0 CPU1 [ 575.455513] ---- ---- [ 575.460160] lock(&cpuctx_mutex); [ 575.463689] lock(pmus_lock); [ 575.469381] lock(&cpuctx_mutex); [ 575.475426] lock(&event->child_mutex); [ 575.479509] [ 575.479509] *** DEADLOCK *** [ 575.479509] [ 575.485670] 1 lock held by syz-executor.1/20668: [ 575.490410] #0: (&cpuctx_mutex){+.+.}, at: [] perf_event_ctx_lock_nested+0x150/0x2c0 [ 575.500045] [ 575.500045] stack backtrace: [ 575.504530] CPU: 1 PID: 20668 Comm: syz-executor.1 Not tainted 4.14.146 #0 [ 575.511562] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 575.520922] Call Trace: [ 575.523545] dump_stack+0x138/0x197 [ 575.527164] ? vprintk_func+0x65/0x159 [ 575.531052] print_circular_bug.isra.0.cold+0x1cc/0x28f [ 575.536418] __lock_acquire+0x2cb3/0x4620 [ 575.540551] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 575.545645] ? trace_hardirqs_on+0x10/0x10 [ 575.549871] ? save_stack+0x45/0xd0 [ 575.553478] ? kasan_kmalloc+0xce/0xf0 [ 575.557371] ? __kmalloc+0x15d/0x7a0 [ 575.561104] lock_acquire+0x16f/0x430 [ 575.564901] ? perf_read+0x2c0/0x820 [ 575.568598] ? perf_read+0x2c0/0x820 [ 575.572295] __mutex_lock+0xe8/0x1470 [ 575.576104] ? perf_read+0x2c0/0x820 [ 575.579803] ? save_trace+0x290/0x290 [ 575.583589] ? perf_read+0x2c0/0x820 [ 575.587289] ? mutex_trylock+0x1c0/0x1c0 [ 575.591334] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 575.596767] ? rcu_read_lock_sched_held+0x110/0x130 [ 575.601765] ? __kmalloc+0x376/0x7a0 [ 575.605486] ? __lock_is_held+0xb6/0x140 [ 575.609538] mutex_lock_nested+0x16/0x20 [ 575.613583] ? mutex_lock_nested+0x16/0x20 [ 575.617816] perf_read+0x2c0/0x820 [ 575.621341] ? __perf_read_group_add+0x680/0x680 [ 575.626093] ? trace_hardirqs_on+0x10/0x10 [ 575.630474] ? selinux_is_enabled+0x9/0x50 [ 575.634810] ? creds_are_invalid+0x48/0x110 [ 575.639249] ? fsnotify+0x92f/0x11e0 [ 575.643058] __vfs_read+0x105/0x6a0 [ 575.646675] ? __fsnotify_update_child_dentry_flags.part.0+0x300/0x300 [ 575.653518] ? __perf_read_group_add+0x680/0x680 [ 575.658265] ? vfs_copy_file_range+0xa40/0xa40 [ 575.662863] ? selinux_file_permission+0x85/0x480 [ 575.667706] ? security_file_permission+0x89/0x1f0 [ 575.672618] ? rw_verify_area+0xea/0x2b0 [ 575.676741] vfs_read+0x137/0x350 [ 575.680199] SyS_read+0xfd/0x230 [ 575.683564] ? kernel_write+0x120/0x120 [ 575.687651] ? do_syscall_64+0x53/0x640 [ 575.691619] ? kernel_write+0x120/0x120 [ 575.695579] do_syscall_64+0x1e8/0x640 [ 575.699560] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 575.704391] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 575.709561] RIP: 0033:0x459a09 [ 575.712730] RSP: 002b:00007f1813606c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 575.720419] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a09 [ 575.727673] RDX: 0000000000000075 RSI: 00000000200002c0 RDI: 0000000000000003 [ 575.734926] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 575.742463] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f18136076d4 03:35:22 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x0, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:35:22 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000000)=@fragment, 0x8) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000000040)=0x3ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 03:35:22 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(0xffffffffffffffff, 0x0, 0x0) write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) lchown(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) 03:35:22 executing program 0: mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) [ 575.749727] R13: 00000000004c5cc7 R14: 00000000004dc2d8 R15: 00000000ffffffff [ 575.767258] kobject: 'loop3' (ffff8880a4a82ea0): kobject_uevent_env [ 575.774786] kobject: 'loop3' (ffff8880a4a82ea0): fill_kobj_path: path = '/devices/virtual/block/loop3' 03:35:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f0000000640)=[{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000300)='|', 0x1}], 0x1}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f0000000b00)=@rc, 0x80, 0x0, 0x0, &(0x7f0000001e40)=""/239, 0xef}}], 0x1, 0x2, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 03:35:22 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) 03:35:22 executing program 0: mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) [ 575.802479] kobject: 'loop5' (ffff8880a4b511a0): kobject_uevent_env [ 575.812011] kobject: 'loop5' (ffff8880a4b511a0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 575.826749] kobject: '0:46' (ffff88808e9024d0): kobject_add_internal: parent: 'bdi', set: 'devices' 03:35:22 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x17, &(0x7f0000000040)=ANY=[@ANYBLOB="b7020000f7ffffffbfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e342b66b249b35e029184e290b39a6f2fc2a5e019bd9690000f002cf57bf887e0243c1145b8a34e6bdc4dc1af6"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) 03:35:22 executing program 4: [ 575.862536] kobject: '0:43' (ffff88808713acd0): kobject_uevent_env [ 575.868997] kobject: '0:43' (ffff88808713acd0): fill_kobj_path: path = '/devices/virtual/bdi/0:43' [ 575.888560] kobject: 'loop3' (ffff8880a4a82ea0): kobject_uevent_env [ 575.895738] kobject: '0:46' (ffff88808e9024d0): kobject_uevent_env [ 575.899755] kobject: 'loop3' (ffff8880a4a82ea0): fill_kobj_path: path = '/devices/virtual/block/loop3' 03:35:22 executing program 0: mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) 03:35:22 executing program 1: 03:35:22 executing program 4: [ 575.916791] kobject: 'loop4' (ffff8880a4abd7a0): kobject_uevent_env [ 575.929623] kobject: 'loop4' (ffff8880a4abd7a0): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 575.944859] kobject: '0:43' (ffff88808713acd0): kobject_cleanup, parent (null) [ 575.952317] kobject: 'loop4' (ffff8880a4abd7a0): kobject_uevent_env [ 575.953500] kobject: '0:46' (ffff88808e9024d0): fill_kobj_path: path = '/devices/virtual/bdi/0:46' [ 575.961639] kobject: 'loop4' (ffff8880a4abd7a0): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 575.999126] kobject: '0:43' (ffff88808713acd0): calling ktype release [ 576.007853] kobject: 'loop4' (ffff8880a4abd7a0): kobject_uevent_env [ 576.014629] kobject: 'loop4' (ffff8880a4abd7a0): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 576.017907] kobject: '0:43': free name [ 576.035078] kobject: '0:47' (ffff888039ddd2d0): kobject_add_internal: parent: 'bdi', set: 'devices' [ 576.045223] kobject: 'loop3' (ffff8880a4a82ea0): kobject_uevent_env [ 576.052345] kobject: '0:47' (ffff888039ddd2d0): kobject_uevent_env [ 576.058764] kobject: 'loop3' (ffff8880a4a82ea0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 576.068709] kobject: '0:47' (ffff888039ddd2d0): fill_kobj_path: path = '/devices/virtual/bdi/0:47' [ 576.070076] kobject: 'loop2' (ffff8880a4a1ae20): kobject_uevent_env [ 576.086377] kobject: 'loop2' (ffff8880a4a1ae20): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 576.111272] kobject: '0:43' (ffff8880614c4d10): kobject_add_internal: parent: 'bdi', set: 'devices' [ 576.122551] kobject: '0:43' (ffff8880614c4d10): kobject_uevent_env [ 576.128975] kobject: '0:43' (ffff8880614c4d10): fill_kobj_path: path = '/devices/virtual/bdi/0:43' [ 576.151184] kobject: '0:47' (ffff888039ddd2d0): kobject_uevent_env [ 576.158065] kobject: '0:47' (ffff888039ddd2d0): fill_kobj_path: path = '/devices/virtual/bdi/0:47' [ 576.168217] kobject: '0:47' (ffff888039ddd2d0): kobject_cleanup, parent (null) [ 576.176707] kobject: '0:47' (ffff888039ddd2d0): calling ktype release [ 576.183460] kobject: '0:47': free name [ 576.220926] kobject: 'rx-0' (ffff8880a85eb850): kobject_cleanup, parent ffff8880964dbb48 [ 576.229282] kobject: 'rx-0' (ffff8880a85eb850): auto cleanup 'remove' event [ 576.236452] kobject: 'rx-0' (ffff8880a85eb850): kobject_uevent_env [ 576.242909] kobject: 'rx-0' (ffff8880a85eb850): kobject_uevent_env: uevent_suppress caused the event to drop! [ 576.253351] kobject: 'rx-0' (ffff8880a85eb850): auto cleanup kobject_del [ 576.260696] kobject: '0:46' (ffff88808e9024d0): kobject_uevent_env [ 576.262423] kobject: 'rx-0' (ffff8880a85eb850): calling ktype release [ 576.267283] kobject: '0:46' (ffff88808e9024d0): fill_kobj_path: path = '/devices/virtual/bdi/0:46' [ 576.273701] kobject: 'rx-0': free name [ 576.286253] kobject: '0:46' (ffff88808e9024d0): kobject_cleanup, parent (null) [ 576.286761] kobject: 'tx-0' (ffff8880950e1cd8): kobject_cleanup, parent ffff8880964dbb48 [ 576.295389] kobject: '0:46' (ffff88808e9024d0): calling ktype release [ 576.303574] kobject: 'tx-0' (ffff8880950e1cd8): auto cleanup 'remove' event [ 576.311915] kobject: '0:46': free name [ 576.317178] kobject: 'tx-0' (ffff8880950e1cd8): kobject_uevent_env [ 576.327462] kobject: 'tx-0' (ffff8880950e1cd8): kobject_uevent_env: uevent_suppress caused the event to drop! [ 576.337703] kobject: 'tx-0' (ffff8880950e1cd8): auto cleanup kobject_del [ 576.344761] kobject: 'tx-0' (ffff8880950e1cd8): calling ktype release [ 576.351457] kobject: 'tx-0': free name [ 576.355441] kobject: 'queues' (ffff8880964dbb48): kobject_cleanup, parent (null) [ 576.364118] kobject: 'queues' (ffff8880964dbb48): calling ktype release [ 576.364620] kobject: 'loop5' (ffff8880a4b511a0): kobject_uevent_env [ 576.371085] kobject: 'queues' (ffff8880964dbb48): kset_release [ 576.371093] kobject: 'queues': free name [ 576.371286] kobject: 'ip6gre0' (ffff8880872d6fb0): kobject_uevent_env [ 576.380978] kobject: 'loop5' (ffff8880a4b511a0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 576.383624] kobject: 'ip6gre0' (ffff8880872d6fb0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 576.390095] net_ratelimit: 18 callbacks suppressed [ 576.390099] protocol 88fb is buggy, dev hsr_slave_0 [ 576.424338] protocol 88fb is buggy, dev hsr_slave_1 [ 576.450272] kobject: 'ip6gre0' (ffff8880872d6fb0): kobject_cleanup, parent (null) [ 576.459092] kobject: 'ip6gre0' (ffff8880872d6fb0): calling ktype release [ 576.466455] kobject: 'ip6gre0': free name [ 576.471147] protocol 88fb is buggy, dev hsr_slave_0 [ 576.476213] protocol 88fb is buggy, dev hsr_slave_1 [ 576.481318] protocol 88fb is buggy, dev hsr_slave_0 [ 576.486352] protocol 88fb is buggy, dev hsr_slave_1 [ 576.492540] kobject: 'rx-0' (ffff888087e73610): kobject_cleanup, parent ffff8880553f3048 [ 576.500836] kobject: 'rx-0' (ffff888087e73610): auto cleanup 'remove' event [ 576.507920] kobject: 'rx-0' (ffff888087e73610): kobject_uevent_env [ 576.514453] kobject: 'rx-0' (ffff888087e73610): kobject_uevent_env: uevent_suppress caused the event to drop! [ 576.524676] kobject: 'rx-0' (ffff888087e73610): auto cleanup kobject_del [ 576.531653] kobject: 'rx-0' (ffff888087e73610): calling ktype release [ 576.538243] kobject: 'rx-0': free name [ 576.542175] kobject: 'tx-0' (ffff88808fc89d18): kobject_cleanup, parent ffff8880553f3048 [ 576.550544] kobject: 'tx-0' (ffff88808fc89d18): auto cleanup 'remove' event [ 576.557660] kobject: 'tx-0' (ffff88808fc89d18): kobject_uevent_env [ 576.564093] kobject: 'tx-0' (ffff88808fc89d18): kobject_uevent_env: uevent_suppress caused the event to drop! [ 576.574168] kobject: 'tx-0' (ffff88808fc89d18): auto cleanup kobject_del [ 576.581048] kobject: 'tx-0' (ffff88808fc89d18): calling ktype release [ 576.587640] kobject: 'tx-0': free name [ 576.591562] kobject: 'queues' (ffff8880553f3048): kobject_cleanup, parent (null) [ 576.599956] kobject: 'queues' (ffff8880553f3048): calling ktype release [ 576.606746] kobject: 'queues' (ffff8880553f3048): kset_release [ 576.612824] kobject: 'queues': free name [ 576.617037] kobject: 'ip6tnl0' (ffff888068b88db0): kobject_uevent_env [ 576.623649] kobject: 'ip6tnl0' (ffff888068b88db0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 576.650257] kobject: 'ip6tnl0' (ffff888068b88db0): kobject_cleanup, parent (null) [ 576.658879] kobject: 'ip6tnl0' (ffff888068b88db0): calling ktype release [ 576.665793] kobject: 'ip6tnl0': free name [ 576.670775] kobject: 'rx-0' (ffff88808156a190): kobject_cleanup, parent ffff8880553f3348 [ 576.679159] kobject: 'rx-0' (ffff88808156a190): auto cleanup 'remove' event [ 576.686384] kobject: 'rx-0' (ffff88808156a190): kobject_uevent_env [ 576.693188] kobject: 'rx-0' (ffff88808156a190): kobject_uevent_env: uevent_suppress caused the event to drop! [ 576.703364] kobject: 'rx-0' (ffff88808156a190): auto cleanup kobject_del [ 576.710304] kobject: 'rx-0' (ffff88808156a190): calling ktype release [ 576.717101] kobject: 'rx-0': free name [ 576.721262] kobject: 'tx-0' (ffff8880914aa098): kobject_cleanup, parent ffff8880553f3348 [ 576.729633] kobject: 'tx-0' (ffff8880914aa098): auto cleanup 'remove' event [ 576.736809] kobject: 'tx-0' (ffff8880914aa098): kobject_uevent_env [ 576.743265] kobject: 'tx-0' (ffff8880914aa098): kobject_uevent_env: uevent_suppress caused the event to drop! [ 576.753417] kobject: 'tx-0' (ffff8880914aa098): auto cleanup kobject_del [ 576.760371] kobject: 'tx-0' (ffff8880914aa098): calling ktype release [ 576.767043] kobject: 'tx-0': free name [ 576.771052] kobject: 'queues' (ffff8880553f3348): kobject_cleanup, parent (null) [ 576.779616] kobject: 'queues' (ffff8880553f3348): calling ktype release [ 576.786499] kobject: 'queues' (ffff8880553f3348): kset_release [ 576.792600] kobject: 'queues': free name [ 576.796907] kobject: 'sit0' (ffff8880a0154bb0): kobject_uevent_env [ 576.800611] protocol 88fb is buggy, dev hsr_slave_0 [ 576.803350] kobject: 'sit0' (ffff8880a0154bb0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 576.808402] protocol 88fb is buggy, dev hsr_slave_1 [ 576.860280] kobject: 'sit0' (ffff8880a0154bb0): kobject_cleanup, parent (null) [ 576.868549] kobject: 'sit0' (ffff8880a0154bb0): calling ktype release [ 576.875197] kobject: 'sit0': free name [ 576.879641] kobject: 'rx-0' (ffff888083d6acd0): kobject_cleanup, parent ffff8880a1688448 [ 576.888103] kobject: 'rx-0' (ffff888083d6acd0): auto cleanup 'remove' event [ 576.895245] kobject: 'rx-0' (ffff888083d6acd0): kobject_uevent_env 03:35:23 executing program 4: 03:35:23 executing program 1: 03:35:23 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x17, &(0x7f0000000040)=ANY=[@ANYBLOB="b7020000f7ffffffbfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e342b66b249b35e029184e290b39a6f2fc2a5e019bd9690000f002cf57bf887e0243c1145b8a34e6bdc4dc1af6"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) 03:35:23 executing program 0: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) 03:35:23 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x0, {0x7}}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:35:23 executing program 5: 03:35:23 executing program 4: 03:35:23 executing program 1: 03:35:23 executing program 5: [ 576.901612] kobject: 'rx-0' (ffff888083d6acd0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 576.920536] kobject: 'rx-0' (ffff888083d6acd0): auto cleanup kobject_del [ 576.929484] kobject: 'rx-0' (ffff888083d6acd0): calling ktype release [ 576.948028] kobject: 'loop4' (ffff8880a4abd7a0): kobject_uevent_env [ 576.950299] kobject: 'rx-0': free name 03:35:23 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x17, &(0x7f0000000040)=ANY=[@ANYBLOB="b7020000f7ffffffbfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e342b66b249b35e029184e290b39a6f2fc2a5e019bd9690000f002cf57bf887e0243c1145b8a34e6bdc4dc1af6"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) 03:35:23 executing program 0: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) [ 576.958677] kobject: 'tx-0' (ffff888059916798): kobject_cleanup, parent ffff8880a1688448 [ 576.958839] kobject: '0:43' (ffff8880614c4d10): kobject_uevent_env [ 576.967463] kobject: 'tx-0' (ffff888059916798): auto cleanup 'remove' event [ 576.981725] kobject: 'tx-0' (ffff888059916798): kobject_uevent_env [ 576.989288] kobject: 'tx-0' (ffff888059916798): kobject_uevent_env: uevent_suppress caused the event to drop! [ 576.993604] kobject: 'loop4' (ffff8880a4abd7a0): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:35:23 executing program 1: 03:35:23 executing program 4: [ 577.002677] kobject: 'tx-0' (ffff888059916798): auto cleanup kobject_del [ 577.011507] kobject: '0:43' (ffff8880614c4d10): fill_kobj_path: path = '/devices/virtual/bdi/0:43' [ 577.019500] kobject: 'tx-0' (ffff888059916798): calling ktype release [ 577.037106] kobject: 'loop5' (ffff8880a4b511a0): kobject_uevent_env [ 577.046264] kobject: '0:43' (ffff8880614c4d10): kobject_cleanup, parent (null) [ 577.052624] kobject: 'tx-0': free name [ 577.058063] kobject: 'loop5' (ffff8880a4b511a0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 577.058966] kobject: 'queues' (ffff8880a1688448): kobject_cleanup, parent (null) [ 577.069319] kobject: '0:43' (ffff8880614c4d10): calling ktype release [ 577.092829] kobject: 'queues' (ffff8880a1688448): calling ktype release 03:35:23 executing program 5: 03:35:23 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000002340)=[{&(0x7f0000002380)=""/4096, 0xbc1}], 0x2000000000000024) 03:35:23 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000200)='threaded\b', 0x175d900f) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f00000034c0)='./bus\x00', 0x0, 0x0) [ 577.103653] kobject: 'loop3' (ffff8880a4a82ea0): kobject_uevent_env [ 577.108793] kobject: 'queues' (ffff8880a1688448): kset_release [ 577.123302] kobject: 'queues': free name [ 577.143431] kobject: 'ip6_vti0' (ffff88808eade9b0): kobject_uevent_env [ 577.157536] kobject: 'loop3' (ffff8880a4a82ea0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 577.158225] kobject: 'ip6_vti0' (ffff88808eade9b0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 577.169880] kobject: '0:43': free name [ 577.180162] kobject: 'loop4' (ffff8880a4abd7a0): kobject_uevent_env [ 577.196713] kobject: 'loop4' (ffff8880a4abd7a0): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 577.220480] kobject: 'loop4' (ffff8880a4abd7a0): kobject_uevent_env [ 577.237012] kobject: 'loop4' (ffff8880a4abd7a0): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 577.242230] kobject: '0:43' (ffff8880a5199310): kobject_add_internal: parent: 'bdi', set: 'devices' [ 577.247183] kobject: 'loop2' (ffff8880a4a1ae20): kobject_uevent_env [ 577.262658] kobject: 'ip6_vti0' (ffff88808eade9b0): kobject_cleanup, parent (null) [ 577.272027] kobject: 'ip6_vti0' (ffff88808eade9b0): calling ktype release [ 577.272997] kobject: '0:43' (ffff8880a5199310): kobject_uevent_env [ 577.278981] kobject: 'ip6_vti0': free name [ 577.279182] kobject: 'loop2' (ffff8880a4a1ae20): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 577.300139] kobject: 'rx-0' (ffff88808528e190): kobject_cleanup, parent ffff888065d22b48 [ 577.304506] kobject: '0:43' (ffff8880a5199310): fill_kobj_path: path = '/devices/virtual/bdi/0:43' [ 577.308393] kobject: 'rx-0' (ffff88808528e190): auto cleanup 'remove' event [ 577.308397] kobject: 'rx-0' (ffff88808528e190): kobject_uevent_env [ 577.308401] kobject: 'rx-0' (ffff88808528e190): kobject_uevent_env: uevent_suppress caused the event to drop! [ 577.308404] kobject: 'rx-0' (ffff88808528e190): auto cleanup kobject_del [ 577.308431] kobject: 'rx-0' (ffff88808528e190): calling ktype release [ 577.308435] kobject: 'rx-0': free name [ 577.308460] kobject: 'tx-0' (ffff888093f66058): kobject_cleanup, parent ffff888065d22b48 [ 577.367663] kobject: 'loop5' (ffff8880a4b511a0): kobject_uevent_env [ 577.374198] kobject: 'loop5' (ffff8880a4b511a0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 577.389678] audit: type=1804 audit(2000000124.080:251): pid=20754 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir813624131/syzkaller.XCjG52/554/bus" dev="sda1" ino=17222 res=1 [ 577.449757] audit: type=1804 audit(2000000124.120:252): pid=20756 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir813624131/syzkaller.XCjG52/554/bus" dev="sda1" ino=17222 res=1 [ 577.470076] kobject: 'tx-0' (ffff888093f66058): auto cleanup 'remove' event [ 577.484687] kobject: 'tx-0' (ffff888093f66058): kobject_uevent_env [ 577.491433] kobject: 'tx-0' (ffff888093f66058): kobject_uevent_env: uevent_suppress caused the event to drop! [ 577.501643] kobject: 'tx-0' (ffff888093f66058): auto cleanup kobject_del [ 577.508548] kobject: 'tx-0' (ffff888093f66058): calling ktype release [ 577.515472] kobject: 'tx-0': free name [ 577.519413] kobject: 'queues' (ffff888065d22b48): kobject_cleanup, parent (null) [ 577.527980] kobject: 'queues' (ffff888065d22b48): calling ktype release [ 577.534821] kobject: 'queues' (ffff888065d22b48): kset_release [ 577.540831] kobject: 'queues': free name [ 577.545106] kobject: 'ip_vti0' (ffff88809fb90770): kobject_uevent_env [ 577.551744] kobject: 'ip_vti0' (ffff88809fb90770): kobject_uevent_env: uevent_suppress caused the event to drop! [ 577.590312] kobject: 'ip_vti0' (ffff88809fb90770): kobject_cleanup, parent (null) [ 577.596788] audit: type=1804 audit(2000000124.290:253): pid=20754 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir813624131/syzkaller.XCjG52/554/bus" dev="sda1" ino=17222 res=1 [ 577.598838] kobject: 'ip_vti0' (ffff88809fb90770): calling ktype release [ 577.598857] kobject: 'ip_vti0': free name [ 577.637884] kobject: 'batman_adv' (ffff8880a1a8c380): kobject_uevent_env [ 577.644788] kobject: 'batman_adv' (ffff8880a1a8c380): kobject_uevent_env: filter function caused the event to drop! [ 577.655821] kobject: 'batman_adv' (ffff8880a1a8c380): kobject_cleanup, parent (null) [ 577.664605] kobject: 'batman_adv' (ffff8880a1a8c380): calling ktype release [ 577.671797] kobject: (ffff8880a1a8c380): dynamic_kobj_release [ 577.677679] kobject: 'batman_adv': free name [ 577.682370] kobject: 'rx-0' (ffff8880a6320b50): kobject_cleanup, parent ffff888065d22f48 [ 577.691154] kobject: 'rx-0' (ffff8880a6320b50): auto cleanup 'remove' event [ 577.698246] kobject: 'rx-0' (ffff8880a6320b50): kobject_uevent_env [ 577.704611] kobject: 'rx-0' (ffff8880a6320b50): kobject_uevent_env: uevent_suppress caused the event to drop! [ 577.714690] kobject: 'rx-0' (ffff8880a6320b50): auto cleanup kobject_del [ 577.721590] kobject: 'rx-0' (ffff8880a6320b50): calling ktype release [ 577.728179] kobject: 'rx-0': free name [ 577.732180] kobject: 'tx-0' (ffff88809ae04cd8): kobject_cleanup, parent ffff888065d22f48 [ 577.740504] kobject: 'tx-0' (ffff88809ae04cd8): auto cleanup 'remove' event [ 577.747638] kobject: 'tx-0' (ffff88809ae04cd8): kobject_uevent_env [ 577.754886] kobject: 'tx-0' (ffff88809ae04cd8): kobject_uevent_env: uevent_suppress caused the event to drop! [ 577.764991] kobject: 'tx-0' (ffff88809ae04cd8): auto cleanup kobject_del [ 577.771898] kobject: 'tx-0' (ffff88809ae04cd8): calling ktype release [ 577.778473] kobject: 'tx-0': free name [ 577.782504] kobject: 'queues' (ffff888065d22f48): kobject_cleanup, parent (null) [ 577.790956] kobject: 'queues' (ffff888065d22f48): calling ktype release [ 577.797702] kobject: 'queues' (ffff888065d22f48): kset_release [ 577.804157] kobject: 'queues': free name [ 577.808448] kobject: 'erspan0' (ffff88808b231470): kobject_uevent_env [ 577.815087] kobject: 'erspan0' (ffff88808b231470): kobject_uevent_env: uevent_suppress caused the event to drop! [ 577.830180] protocol 88fb is buggy, dev hsr_slave_0 [ 577.830221] protocol 88fb is buggy, dev hsr_slave_0 [ 577.840202] kobject: 'erspan0' (ffff88808b231470): kobject_cleanup, parent (null) [ 577.849116] kobject: 'erspan0' (ffff88808b231470): calling ktype release [ 577.856386] kobject: 'erspan0': free name [ 577.861236] kobject: 'batman_adv' (ffff888099cdc600): kobject_uevent_env [ 577.868274] kobject: 'batman_adv' (ffff888099cdc600): kobject_uevent_env: filter function caused the event to drop! [ 577.878948] kobject: 'batman_adv' (ffff888099cdc600): kobject_cleanup, parent (null) [ 577.887871] kobject: 'batman_adv' (ffff888099cdc600): calling ktype release [ 577.895003] kobject: (ffff888099cdc600): dynamic_kobj_release [ 577.901214] kobject: 'batman_adv': free name [ 577.905799] kobject: 'rx-0' (ffff8880972786d0): kobject_cleanup, parent ffff8880a8e67348 [ 577.914085] kobject: 'rx-0' (ffff8880972786d0): auto cleanup 'remove' event [ 577.921220] kobject: 'rx-0' (ffff8880972786d0): kobject_uevent_env [ 577.927538] kobject: 'rx-0' (ffff8880972786d0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 577.937621] kobject: 'rx-0' (ffff8880972786d0): auto cleanup kobject_del [ 577.944515] kobject: 'rx-0' (ffff8880972786d0): calling ktype release [ 577.951118] kobject: 'rx-0': free name [ 577.955019] kobject: 'tx-0' (ffff888096e20a58): kobject_cleanup, parent ffff8880a8e67348 [ 577.963272] kobject: 'tx-0' (ffff888096e20a58): auto cleanup 'remove' event [ 577.970673] kobject: 'tx-0' (ffff888096e20a58): kobject_uevent_env [ 577.977011] kobject: 'tx-0' (ffff888096e20a58): kobject_uevent_env: uevent_suppress caused the event to drop! [ 577.987087] kobject: 'tx-0' (ffff888096e20a58): auto cleanup kobject_del [ 577.994349] kobject: 'tx-0' (ffff888096e20a58): calling ktype release 03:35:24 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:35:24 executing program 0: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) 03:35:24 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x22, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) 03:35:24 executing program 5: r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r1 = dup(r0) getsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f00000004c0)=""/200, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0xe476, @loopback}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) ioprio_set$pid(0x1, r2, 0xd81) r3 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f0000000000)={'lapb0\x00', {0x2, 0x4e24, @broadcast}}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) fcntl$getownex(r5, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r6, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) ptrace$setregset(0x4205, r6, 0x605, &(0x7f0000000140)={&(0x7f0000000080)="07299aae48119f25", 0x8}) sendmsg$nl_netfilter(r4, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)=0x3f) ftruncate(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x135, 0x0, 0x0, 0xffffffffffff8000, 0x2000000, 0x0, 0x1000, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffff3e4b, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000001640)='./file0\x00', &(0x7f0000001680)='trusted.overlay.upper\x00', &(0x7f00000016c0)=ANY=[@ANYBLOB='\x00\x00\x00'], 0x1, 0x3) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) r7 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) clock_gettime(0x0, 0x0) ftruncate(r7, 0x2007fff) sendfile(r1, r7, 0x0, 0x87ff7) 03:35:24 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f0000000080)='./file0\x00', 0x0) 03:35:24 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000200)='threaded\b', 0x175d900f) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f00000034c0)='./bus\x00', 0x0, 0x0) 03:35:24 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x22, &(0x7f0000000040)=ANY=[@ANYBLOB="b7020000f7ffffffbfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e342b66b249b35e029184e290b39a6f2fc2a5e019bd9690000f002cf57bf887e0243c1145b8a34e6bdc4dc1af6d3c6958da4bddac602e0502aec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8f61e1574f21a5f03dff2c779bf342055ea309c9c7c6607b5a9004d5271b41be073657d3d439e8134c0f94"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) 03:35:24 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) [ 578.000977] kobject: 'tx-0': free name [ 578.004878] kobject: 'queues' (ffff8880a8e67348): kobject_cleanup, parent (null) [ 578.013327] kobject: 'queues' (ffff8880a8e67348): calling ktype release [ 578.020116] kobject: 'queues' (ffff8880a8e67348): kset_release [ 578.026086] kobject: 'queues': free name [ 578.030451] kobject: 'gretap0' (ffff888057777270): kobject_uevent_env [ 578.037039] kobject: 'gretap0' (ffff888057777270): kobject_uevent_env: uevent_suppress caused the event to drop! 03:35:24 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xedf2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000280)={@multicast2, @dev}, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(0x0, &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$revoke(0x3, r1) keyctl$unlink(0x6, r1, 0x0) keyctl$instantiate_iov(0x14, r1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa01bbb2e2bfe4737}}, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) modify_ldt$write2(0x11, 0x0, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$unlink(0x6, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$revoke(0x3, 0x0) [ 578.083463] kobject: 'loop3' (ffff8880a4a82ea0): kobject_uevent_env [ 578.089932] kobject: 'loop3' (ffff8880a4a82ea0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 578.095290] ptrace attach of "/root/syz-executor.5"[20101] was attempted by "/root/syz-executor.5"[20770] [ 578.100231] kobject: 'gretap0' (ffff888057777270): kobject_cleanup, parent (null) [ 578.114249] kobject: '0:43' (ffff8880a5199310): kobject_uevent_env 03:35:24 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) 03:35:24 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xedf2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000280)={@multicast2, @dev}, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(0x0, &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$revoke(0x3, r1) keyctl$unlink(0x6, r1, 0x0) keyctl$instantiate_iov(0x14, r1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa01bbb2e2bfe4737}}, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) modify_ldt$write2(0x11, 0x0, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$unlink(0x6, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$revoke(0x3, 0x0) 03:35:24 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x22, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) [ 578.130770] kobject: '0:43' (ffff8880a5199310): fill_kobj_path: path = '/devices/virtual/bdi/0:43' [ 578.148521] kobject: 'loop4' (ffff8880a4abd7a0): kobject_uevent_env [ 578.151996] kobject: '0:43' (ffff8880a5199310): kobject_cleanup, parent (null) [ 578.156167] kobject: 'gretap0' (ffff888057777270): calling ktype release [ 578.188166] kobject: '0:43' (ffff8880a5199310): calling ktype release [ 578.192831] kobject: 'loop4' (ffff8880a4abd7a0): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 578.195423] kobject: '0:43': free name [ 578.216036] kobject: 'gretap0': free name [ 578.221846] kobject: 'loop3' (ffff8880a4a82ea0): kobject_uevent_env [ 578.228797] kobject: 'rx-0' (ffff8880a5acd850): kobject_cleanup, parent ffff888056862548 [ 578.250090] kobject: 'loop3' (ffff8880a4a82ea0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 578.268864] kobject: 'rx-0' (ffff8880a5acd850): auto cleanup 'remove' event [ 578.276787] kobject: '0:43' (ffff88808a842110): kobject_add_internal: parent: 'bdi', set: 'devices' [ 578.292672] kobject: 'rx-0' (ffff8880a5acd850): kobject_uevent_env [ 578.295655] kobject: '0:43' (ffff88808a842110): kobject_uevent_env [ 578.299594] kobject: 'loop4' (ffff8880a4abd7a0): kobject_uevent_env [ 578.315386] kobject: '0:43' (ffff88808a842110): fill_kobj_path: path = '/devices/virtual/bdi/0:43' [ 578.318502] kobject: 'rx-0' (ffff8880a5acd850): kobject_uevent_env: uevent_suppress caused the event to drop! [ 578.341252] kobject: 'loop4' (ffff8880a4abd7a0): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:35:25 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:35:25 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) 03:35:25 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xedf2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000280)={@multicast2, @dev}, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(0x0, &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$revoke(0x3, r1) keyctl$unlink(0x6, r1, 0x0) keyctl$instantiate_iov(0x14, r1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa01bbb2e2bfe4737}}, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) modify_ldt$write2(0x11, 0x0, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$unlink(0x6, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$revoke(0x3, 0x0) [ 578.367416] kobject: 'rx-0' (ffff8880a5acd850): auto cleanup kobject_del [ 578.375728] kobject: 'loop2' (ffff8880a4a1ae20): kobject_uevent_env [ 578.382661] kobject: '0:43' (ffff88808a842110): kobject_uevent_env [ 578.394641] kobject: '0:43' (ffff88808a842110): fill_kobj_path: path = '/devices/virtual/bdi/0:43' [ 578.394856] kobject: 'rx-0' (ffff8880a5acd850): calling ktype release [ 578.411595] kobject: 'loop2' (ffff8880a4a1ae20): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 578.427238] audit: type=1804 audit(2000000125.120:254): pid=20775 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir813624131/syzkaller.XCjG52/555/bus" dev="sda1" ino=17281 res=1 [ 578.444787] kobject: 'loop3' (ffff8880a4a82ea0): kobject_uevent_env [ 578.474619] kobject: 'rx-0': free name [ 578.488884] kobject: 'tx-0' (ffff88805b6bd318): kobject_cleanup, parent ffff888056862548 [ 578.505420] kobject: '0:43' (ffff88808a842110): kobject_cleanup, parent (null) [ 578.511546] kobject: 'loop3' (ffff8880a4a82ea0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 578.523554] kobject: 'tx-0' (ffff88805b6bd318): auto cleanup 'remove' event [ 578.538633] kobject: 'tx-0' (ffff88805b6bd318): kobject_uevent_env [ 578.539514] kobject: '0:43' (ffff88808a842110): calling ktype release [ 578.555565] audit: type=1804 audit(2000000125.130:255): pid=20781 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir813624131/syzkaller.XCjG52/555/bus" dev="sda1" ino=17281 res=1 [ 578.561979] kobject: 'tx-0' (ffff88805b6bd318): kobject_uevent_env: uevent_suppress caused the event to drop! [ 578.599117] kobject: '0:43': free name [ 578.631338] kobject: 'loop2' (ffff8880a4a1ae20): kobject_uevent_env [ 578.638015] kobject: 'loop2' (ffff8880a4a1ae20): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 578.654598] kobject: 'tx-0' (ffff88805b6bd318): auto cleanup kobject_del [ 578.660640] ptrace attach of "/root/syz-executor.5"[20101] was attempted by "/root/syz-executor.5"[20770] [ 578.669173] kobject: 'tx-0' (ffff88805b6bd318): calling ktype release [ 578.682449] kobject: 'tx-0': free name [ 578.690783] kobject: 'queues' (ffff888056862548): kobject_cleanup, parent (null) [ 578.705436] kobject: '0:43' (ffff8880a8bd0450): kobject_add_internal: parent: 'bdi', set: 'devices' [ 578.718038] kobject: 'queues' (ffff888056862548): calling ktype release [ 578.726204] kobject: '0:43' (ffff8880a8bd0450): kobject_uevent_env 03:35:25 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x28, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) 03:35:25 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) [ 578.732616] kobject: 'queues' (ffff888056862548): kset_release [ 578.738682] kobject: '0:43' (ffff8880a8bd0450): fill_kobj_path: path = '/devices/virtual/bdi/0:43' [ 578.747921] kobject: 'queues': free name [ 578.753452] kobject: 'gre0' (ffff888062cd69f0): kobject_uevent_env [ 578.766535] kobject: 'gre0' (ffff888062cd69f0): kobject_uevent_env: uevent_suppress caused the event to drop! 03:35:25 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000200)='threaded\b', 0x175d900f) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f00000034c0)='./bus\x00', 0x0, 0x0) 03:35:25 executing program 5: r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r1 = dup(r0) getsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f00000004c0)=""/200, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0xe476, @loopback}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) ioprio_set$pid(0x1, r2, 0xd81) r3 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f0000000000)={'lapb0\x00', {0x2, 0x4e24, @broadcast}}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) fcntl$getownex(r5, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r6, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) ptrace$setregset(0x4205, r6, 0x605, &(0x7f0000000140)={&(0x7f0000000080)="07299aae48119f25", 0x8}) sendmsg$nl_netfilter(r4, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)=0x3f) ftruncate(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x135, 0x0, 0x0, 0xffffffffffff8000, 0x2000000, 0x0, 0x1000, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffff3e4b, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000001640)='./file0\x00', &(0x7f0000001680)='trusted.overlay.upper\x00', &(0x7f00000016c0)=ANY=[@ANYBLOB='\x00\x00\x00'], 0x1, 0x3) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) r7 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) clock_gettime(0x0, 0x0) ftruncate(r7, 0x2007fff) sendfile(r1, r7, 0x0, 0x87ff7) 03:35:25 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xedf2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000280)={@multicast2, @dev}, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(0x0, &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$revoke(0x3, r1) keyctl$unlink(0x6, r1, 0x0) keyctl$instantiate_iov(0x14, r1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa01bbb2e2bfe4737}}, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) modify_ldt$write2(0x11, 0x0, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$unlink(0x6, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$revoke(0x3, 0x0) 03:35:25 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1}, 0x18) statfs(&(0x7f0000000000)='./file0\x00', 0x0) 03:35:25 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x28, &(0x7f0000000040)=ANY=[@ANYBLOB="b7020000f7ffffffbfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e342b66b249b35e029184e290b39a6f2fc2a5e019bd9690000f002cf57bf887e0243c1145b8a34e6bdc4dc1af6d3c6958da4bddac602e0502aec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8f61e1574f21a5f03dff2c779bf342055ea309c9c7c6607b5a9004d5271b41be073657d3d439e8134c0f9413e0c53fbec2f1add5694dfc3fc201c6b1c22876921d414cfa9270d556a033d0cea20eb522fce4f95d9d21f5f8d9"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) 03:35:25 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) [ 578.786724] kobject: 'loop5' (ffff8880a4b511a0): kobject_uevent_env [ 578.799886] kobject: 'loop5' (ffff8880a4b511a0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 578.810424] kobject: 'gre0' (ffff888062cd69f0): kobject_cleanup, parent (null) [ 578.819521] kobject: 'gre0' (ffff888062cd69f0): calling ktype release [ 578.837541] kobject: 'loop3' (ffff8880a4a82ea0): kobject_uevent_env [ 578.837631] kobject: '0:43' (ffff8880a8bd0450): kobject_uevent_env [ 578.845025] kobject: 'gre0': free name [ 578.855632] kobject: 'loop3' (ffff8880a4a82ea0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 578.876942] kobject: '0:43' (ffff8880a8bd0450): fill_kobj_path: path = '/devices/virtual/bdi/0:43' 03:35:25 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x28, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) [ 578.886741] kobject: 'rx-0' (ffff888098d9cd90): kobject_cleanup, parent ffff888056862948 [ 578.907463] kobject: 'rx-0' (ffff888098d9cd90): auto cleanup 'remove' event [ 578.916754] kobject: '0:43' (ffff8880a8bd0450): kobject_cleanup, parent (null) [ 578.916927] kobject: 'rx-0' (ffff888098d9cd90): kobject_uevent_env [ 578.928659] kobject: 'loop3' (ffff8880a4a82ea0): kobject_uevent_env 03:35:25 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xedf2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000280)={@multicast2, @dev}, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(0x0, &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$revoke(0x3, r1) keyctl$unlink(0x6, r1, 0x0) keyctl$instantiate_iov(0x14, r1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa01bbb2e2bfe4737}}, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) modify_ldt$write2(0x11, 0x0, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$unlink(0x6, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) 03:35:25 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) [ 578.933772] kobject: 'rx-0' (ffff888098d9cd90): kobject_uevent_env: uevent_suppress caused the event to drop! [ 578.941592] kobject: 'loop3' (ffff8880a4a82ea0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 578.956297] kobject: 'rx-0' (ffff888098d9cd90): auto cleanup kobject_del [ 578.972495] kobject: 'rx-0' (ffff888098d9cd90): calling ktype release [ 578.979104] kobject: 'rx-0': free name 03:35:25 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2b, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) 03:35:25 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xedf2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000280)={@multicast2, @dev}, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(0x0, &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$revoke(0x3, r1) keyctl$unlink(0x6, r1, 0x0) keyctl$instantiate_iov(0x14, r1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa01bbb2e2bfe4737}}, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) modify_ldt$write2(0x11, 0x0, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$unlink(0x6, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) 03:35:25 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r1 = dup(r0) getsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f00000004c0)=""/200, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0xe476, @loopback}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) ioprio_set$pid(0x1, r2, 0xd81) r3 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f0000000000)={'lapb0\x00', {0x2, 0x4e24, @broadcast}}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) fcntl$getownex(r5, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r6, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) ptrace$setregset(0x4205, r6, 0x605, &(0x7f0000000140)={&(0x7f0000000080)="07299aae48119f25", 0x8}) sendmsg$nl_netfilter(r4, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)=0x3f) ftruncate(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x135, 0x0, 0x0, 0xffffffffffff8000, 0x2000000, 0x0, 0x1000, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffff3e4b, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000001640)='./file0\x00', &(0x7f0000001680)='trusted.overlay.upper\x00', &(0x7f00000016c0)=ANY=[@ANYBLOB='\x00\x00\x00'], 0x1, 0x3) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) r7 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) clock_gettime(0x0, 0x0) ftruncate(r7, 0x2007fff) sendfile(r1, r7, 0x0, 0x87ff7) [ 578.988286] kobject: '0:43' (ffff8880a8bd0450): calling ktype release [ 578.998443] kobject: 'tx-0' (ffff8880a891b558): kobject_cleanup, parent ffff888056862948 [ 579.014962] kobject: 'loop4' (ffff8880a4abd7a0): kobject_uevent_env [ 579.024212] kobject: 'tx-0' (ffff8880a891b558): auto cleanup 'remove' event [ 579.024237] kobject: '0:43': free name [ 579.059895] kobject: 'loop4' (ffff8880a4abd7a0): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 579.066922] kobject: 'tx-0' (ffff8880a891b558): kobject_uevent_env [ 579.086178] kobject: 'loop2' (ffff8880a4a1ae20): kobject_uevent_env [ 579.092453] kobject: 'tx-0' (ffff8880a891b558): kobject_uevent_env: uevent_suppress caused the event to drop! [ 579.118007] kobject: 'tx-0' (ffff8880a891b558): auto cleanup kobject_del [ 579.121682] kobject: 'loop2' (ffff8880a4a1ae20): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 579.125353] kobject: 'tx-0' (ffff8880a891b558): calling ktype release [ 579.142080] kobject: 'tx-0': free name [ 579.147306] kobject: '0:43' (ffff88809fa2d150): kobject_add_internal: parent: 'bdi', set: 'devices' [ 579.156381] kobject: 'loop3' (ffff8880a4a82ea0): kobject_uevent_env [ 579.159313] kobject: 'queues' (ffff888056862948): kobject_cleanup, parent (null) [ 579.173009] kobject: '0:43' (ffff88809fa2d150): kobject_uevent_env [ 579.174054] kobject: 'loop3' (ffff8880a4a82ea0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 579.183837] kobject: '0:43' (ffff88809fa2d150): fill_kobj_path: path = '/devices/virtual/bdi/0:43' [ 579.199068] kobject: 'queues' (ffff888056862948): calling ktype release [ 579.206743] kobject: 'queues' (ffff888056862948): kset_release [ 579.217952] kobject: 'queues': free name [ 579.234435] kobject: 'tunl0' (ffff888059d7aab0): kobject_uevent_env [ 579.244607] kobject: 'tunl0' (ffff888059d7aab0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 579.255281] ptrace attach of "/root/syz-executor.5"[20101] was attempted by "/root/syz-executor.5"[20818] [ 579.272620] kobject: '0:43' (ffff88809fa2d150): kobject_uevent_env [ 579.277719] ptrace attach of "/root/syz-executor.0"[9283] was attempted by "/root/syz-executor.0"[20841] [ 579.280342] kobject: '0:43' (ffff88809fa2d150): fill_kobj_path: path = '/devices/virtual/bdi/0:43' [ 579.310130] audit: type=1804 audit(2000000126.000:256): pid=20849 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir813624131/syzkaller.XCjG52/556/bus" dev="sda1" ino=17281 res=1 [ 579.310282] kobject: 'tunl0' (ffff888059d7aab0): kobject_cleanup, parent (null) [ 579.348154] kobject: 'tunl0' (ffff888059d7aab0): calling ktype release [ 579.358415] kobject: 'tunl0': free name [ 579.381425] kobject: '0:43' (ffff88809fa2d150): kobject_cleanup, parent (null) [ 579.390847] kobject: '0:43' (ffff88809fa2d150): calling ktype release [ 579.397588] kobject: '0:43': free name [ 579.403230] audit: type=1804 audit(2000000126.040:257): pid=20851 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir813624131/syzkaller.XCjG52/556/bus" dev="sda1" ino=17281 res=1 [ 579.403421] kobject: 'rx-0' (ffff88808ab5ee50): kobject_cleanup, parent ffff88809f39f848 [ 579.456827] kobject: 'loop2' (ffff8880a4a1ae20): kobject_uevent_env [ 579.464472] kobject: 'loop2' (ffff8880a4a1ae20): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 579.488599] kobject: 'rx-0' (ffff88808ab5ee50): auto cleanup 'remove' event [ 579.495994] kobject: 'rx-0' (ffff88808ab5ee50): kobject_uevent_env [ 579.502475] kobject: 'rx-0' (ffff88808ab5ee50): kobject_uevent_env: uevent_suppress caused the event to drop! [ 579.513252] kobject: 'rx-0' (ffff88808ab5ee50): auto cleanup kobject_del [ 579.522074] kobject: 'rx-0' (ffff88808ab5ee50): calling ktype release [ 579.528774] kobject: 'rx-0': free name [ 579.533228] kobject: 'tx-0' (ffff88809f093c98): kobject_cleanup, parent ffff88809f39f848 [ 579.543267] kobject: 'tx-0' (ffff88809f093c98): auto cleanup 'remove' event [ 579.550898] kobject: 'tx-0' (ffff88809f093c98): kobject_uevent_env [ 579.557340] kobject: 'tx-0' (ffff88809f093c98): kobject_uevent_env: uevent_suppress caused the event to drop! [ 579.569277] kobject: 'tx-0' (ffff88809f093c98): auto cleanup kobject_del [ 579.576639] kobject: 'tx-0' (ffff88809f093c98): calling ktype release 03:35:26 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000200)='threaded\b', 0x175d900f) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(&(0x7f00000034c0)='./bus\x00', 0x0, 0x0) [ 579.585643] kobject: 'tx-0': free name [ 579.589672] kobject: 'queues' (ffff88809f39f848): kobject_cleanup, parent (null) [ 579.598646] kobject: 'queues' (ffff88809f39f848): calling ktype release [ 579.607281] kobject: 'queues' (ffff88809f39f848): kset_release [ 579.615058] kobject: 'queues': free name [ 579.630297] kobject: 'lo' (ffff8880a907d030): kobject_uevent_env 03:35:26 executing program 5: r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r1 = dup(r0) getsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f00000004c0)=""/200, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0xe476, @loopback}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) ioprio_set$pid(0x1, r2, 0xd81) r3 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f0000000000)={'lapb0\x00', {0x2, 0x4e24, @broadcast}}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) fcntl$getownex(r5, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r6, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) ptrace$setregset(0x4205, r6, 0x605, &(0x7f0000000140)={&(0x7f0000000080)="07299aae48119f25", 0x8}) sendmsg$nl_netfilter(r4, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)=0x3f) ftruncate(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x135, 0x0, 0x0, 0xffffffffffff8000, 0x2000000, 0x0, 0x1000, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffff3e4b, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000001640)='./file0\x00', &(0x7f0000001680)='trusted.overlay.upper\x00', &(0x7f00000016c0)=ANY=[@ANYBLOB='\x00\x00\x00'], 0x1, 0x3) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) r7 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) clock_gettime(0x0, 0x0) ftruncate(r7, 0x2007fff) sendfile(r1, r7, 0x0, 0x87ff7) 03:35:26 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2b, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) 03:35:26 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xedf2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000280)={@multicast2, @dev}, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(0x0, &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$revoke(0x3, r1) keyctl$unlink(0x6, r1, 0x0) keyctl$instantiate_iov(0x14, r1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa01bbb2e2bfe4737}}, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) modify_ldt$write2(0x11, 0x0, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$unlink(0x6, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) 03:35:26 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(0x0, 0x0) [ 579.636565] kobject: 'lo' (ffff8880a907d030): kobject_uevent_env: uevent_suppress caused the event to drop! [ 579.673378] kobject: 'loop5' (ffff8880a4b511a0): kobject_uevent_env 03:35:26 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xedf2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000280)={@multicast2, @dev}, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(0x0, &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$revoke(0x3, r1) keyctl$unlink(0x6, r1, 0x0) keyctl$instantiate_iov(0x14, r1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa01bbb2e2bfe4737}}, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) modify_ldt$write2(0x11, 0x0, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$unlink(0x6, 0x0, 0x0) [ 579.684317] kobject: '0:43' (ffff88809b45c990): kobject_add_internal: parent: 'bdi', set: 'devices' [ 579.686012] kobject: 'loop5' (ffff8880a4b511a0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 579.696667] kobject: '0:43' (ffff88809b45c990): kobject_uevent_env [ 579.711564] kobject: 'lo' (ffff8880a907d030): kobject_cleanup, parent (null) [ 579.719736] kobject: 'lo' (ffff8880a907d030): calling ktype release [ 579.720994] kobject: 'loop4' (ffff8880a4abd7a0): kobject_uevent_env 03:35:26 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2b, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) 03:35:26 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xedf2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000280)={@multicast2, @dev}, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(0x0, &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$revoke(0x3, r1) keyctl$unlink(0x6, r1, 0x0) keyctl$instantiate_iov(0x14, r1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa01bbb2e2bfe4737}}, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) modify_ldt$write2(0x11, 0x0, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) clone(0x0, 0x0, 0x0, 0x0, 0x0) 03:35:26 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(0x0, 0x0) [ 579.733997] kobject: '0:43' (ffff88809b45c990): fill_kobj_path: path = '/devices/virtual/bdi/0:43' [ 579.743744] kobject: 'lo': free name [ 579.765980] kobject: 'loop4' (ffff8880a4abd7a0): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:35:26 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2c, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) 03:35:26 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xedf2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000280)={@multicast2, @dev}, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(0x0, &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$revoke(0x3, r1) keyctl$unlink(0x6, r1, 0x0) keyctl$instantiate_iov(0x14, r1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa01bbb2e2bfe4737}}, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) modify_ldt$write2(0x11, 0x0, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) [ 579.802747] kobject: '0:43' (ffff88809b45c990): kobject_uevent_env [ 579.824119] kobject: '0:43' (ffff88809b45c990): fill_kobj_path: path = '/devices/virtual/bdi/0:43' [ 579.837542] kobject: 'loop3' (ffff8880a4a82ea0): kobject_uevent_env [ 579.866618] kobject: 'loop3' (ffff8880a4a82ea0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 579.882550] kobject: '0:43' (ffff88809b45c990): kobject_cleanup, parent (null) [ 579.893980] kobject: 'loop4' (ffff8880a4abd7a0): kobject_uevent_env [ 579.905153] kobject: '0:43' (ffff88809b45c990): calling ktype release [ 579.920162] kobject: '0:43': free name [ 579.923861] kobject: 'loop4' (ffff8880a4abd7a0): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 579.948096] kobject: 'loop3' (ffff8880a4a82ea0): kobject_uevent_env [ 579.963720] kobject: 'loop3' (ffff8880a4a82ea0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 579.975959] kobject: '0:43' (ffff888063e64110): kobject_add_internal: parent: 'bdi', set: 'devices' [ 579.989488] kobject: 'loop3' (ffff8880a4a82ea0): kobject_uevent_env [ 579.993080] kobject: '0:43' (ffff888063e64110): kobject_uevent_env [ 580.012366] kobject: '0:43' (ffff888063e64110): fill_kobj_path: path = '/devices/virtual/bdi/0:43' [ 580.014324] kobject: 'loop3' (ffff8880a4a82ea0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 580.054994] kobject: 'loop2' (ffff8880a4a1ae20): kobject_uevent_env [ 580.069119] kobject: 'loop2' (ffff8880a4a1ae20): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 580.078976] kobject: '0:43' (ffff888063e64110): kobject_uevent_env [ 580.086553] kobject: '0:43' (ffff888063e64110): fill_kobj_path: path = '/devices/virtual/bdi/0:43' [ 580.100355] audit: type=1804 audit(2000000126.790:258): pid=20878 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir813624131/syzkaller.XCjG52/557/bus" dev="sda1" ino=17297 res=1 [ 580.107113] kobject: '0:43' (ffff888063e64110): kobject_cleanup, parent (null) [ 580.168636] audit: type=1804 audit(2000000126.830:259): pid=20883 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir813624131/syzkaller.XCjG52/557/bus" dev="sda1" ino=17297 res=1 [ 580.202763] kobject: '0:43' (ffff888063e64110): calling ktype release [ 580.213972] kobject: '0:43': free name 03:35:26 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r1 = dup(r0) getsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f00000004c0)=""/200, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0xe476, @loopback}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) ioprio_set$pid(0x1, r2, 0xd81) r3 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f0000000000)={'lapb0\x00', {0x2, 0x4e24, @broadcast}}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) fcntl$getownex(r5, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r6, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) ptrace$setregset(0x4205, r6, 0x605, &(0x7f0000000140)={&(0x7f0000000080)="07299aae48119f25", 0x8}) sendmsg$nl_netfilter(r4, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)=0x3f) ftruncate(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x135, 0x0, 0x0, 0xffffffffffff8000, 0x2000000, 0x0, 0x1000, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffff3e4b, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000001640)='./file0\x00', &(0x7f0000001680)='trusted.overlay.upper\x00', &(0x7f00000016c0)=ANY=[@ANYBLOB='\x00\x00\x00'], 0x1, 0x3) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) r7 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) clock_gettime(0x0, 0x0) ftruncate(r7, 0x2007fff) sendfile(r1, r7, 0x0, 0x87ff7) [ 580.249304] ptrace attach of "/root/syz-executor.5"[20101] was attempted by "/root/syz-executor.5"[20864] 03:35:27 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000200)='threaded\b', 0x175d900f) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) [ 580.313599] ptrace attach of "/root/syz-executor.0"[9283] was attempted by "/root/syz-executor.0"[20895] 03:35:27 executing program 5: r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r1 = dup(r0) getsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f00000004c0)=""/200, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0xe476, @loopback}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) ioprio_set$pid(0x1, r2, 0xd81) r3 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f0000000000)={'lapb0\x00', {0x2, 0x4e24, @broadcast}}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) fcntl$getownex(r5, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r6, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) ptrace$setregset(0x4205, r6, 0x605, &(0x7f0000000140)={&(0x7f0000000080)="07299aae48119f25", 0x8}) sendmsg$nl_netfilter(r4, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)=0x3f) ftruncate(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x135, 0x0, 0x0, 0xffffffffffff8000, 0x2000000, 0x0, 0x1000, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffff3e4b, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000001640)='./file0\x00', &(0x7f0000001680)='trusted.overlay.upper\x00', &(0x7f00000016c0)=ANY=[@ANYBLOB='\x00\x00\x00'], 0x1, 0x3) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) r7 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) clock_gettime(0x0, 0x0) ftruncate(r7, 0x2007fff) sendfile(r1, r7, 0x0, 0x87ff7) 03:35:27 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2c, &(0x7f0000000040)=ANY=[@ANYBLOB="b7020000f7ffffffbfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001077d60b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28683a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e342b66b249b35e029184e290b39a6f2fc2a5e019bd9690000f002cf57bf887e0243c1145b8a34e6bdc4dc1af6d3c6958da4bddac602e0502aec11e874602f925b6dbd2af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8f61e1574f21a5f03dff2c779bf342055ea309c9c7c6607b5a9004d5271b41be073657d3d439e8134c0f9413e0c53fbec2f1add5694dfc3fc201c6b1c22876921d414cfa9270d556a033d0cea20eb522fce4f95d9d21f5f8d9a863314835e8cc7f34f9cc41d25f2299fbae4492b8bd580e61b7bc945255bd8cbf9aaa"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) 03:35:27 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xedf2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000280)={@multicast2, @dev}, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(0x0, &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$revoke(0x3, r1) keyctl$unlink(0x6, r1, 0x0) keyctl$instantiate_iov(0x14, r1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa01bbb2e2bfe4737}}, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) modify_ldt$write2(0x11, 0x0, 0x0) 03:35:27 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002780), 0x1000) write$FUSE_BMAP(r0, &(0x7f0000003780)={0x18, 0x0, 0x1, {0x7}}, 0x18) statfs(0x0, 0x0) 03:35:27 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r1 = dup(r0) getsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f00000004c0)=""/200, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0xe476, @loopback}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) ioprio_set$pid(0x1, r2, 0xd81) r3 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f0000000000)={'lapb0\x00', {0x2, 0x4e24, @broadcast}}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) fcntl$getownex(r5, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r6, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) ptrace$setregset(0x4205, r6, 0x605, &(0x7f0000000140)={&(0x7f0000000080)="07299aae48119f25", 0x8}) sendmsg$nl_netfilter(r4, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)=0x3f) ftruncate(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x135, 0x0, 0x0, 0xffffffffffff8000, 0x2000000, 0x0, 0x1000, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffff3e4b, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000001640)='./file0\x00', &(0x7f0000001680)='trusted.overlay.upper\x00', &(0x7f00000016c0)=ANY=[@ANYBLOB='\x00\x00\x00'], 0x1, 0x3) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) r7 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) clock_gettime(0x0, 0x0) ftruncate(r7, 0x2007fff) sendfile(r1, r7, 0x0, 0x87ff7) 03:35:27 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xedf2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000280)={@multicast2, @dev}, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(0x0, &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$revoke(0x3, r1) keyctl$unlink(0x6, r1, 0x0) keyctl$instantiate_iov(0x14, r1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa01bbb2e2bfe4737}}, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:35:27 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2c, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) [ 580.496789] kobject: 'loop5' (ffff8880a4b511a0): kobject_uevent_env [ 580.511354] kobject: '0:43' (ffff8880629f8190): kobject_add_internal: parent: 'bdi', set: 'devices' [ 580.524493] kobject: 'loop5' (ffff8880a4b511a0): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 580.538781] kobject: '0:43' (ffff8880629f8190): kobject_uevent_env [ 580.575271] kobject: 'loop4' (ffff8880a4abd7a0): kobject_uevent_env [ 580.582110] audit: type=1804 audit(2000000127.280:260): pid=20901 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir813624131/syzkaller.XCjG52/558/bus" dev="sda1" ino=17297 res=1 [ 580.598252] kobject: '0:43' (ffff8880629f8190): fill_kobj_path: path = '/devices/virtual/bdi/0:43' 03:35:27 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2d, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) 03:35:27 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xedf2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000280)={@multicast2, @dev}, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(0x0, &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$revoke(0x3, r1) keyctl$unlink(0x6, r1, 0x0) keyctl$instantiate_iov(0x14, r1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa01bbb2e2bfe4737}}, 0x0, 0xfffffffffffffff7, 0xffffffffffffffff, 0x0) [ 580.633203] kobject: 'loop4' (ffff8880a4abd7a0): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 580.649324] ptrace attach of "/root/syz-executor.0"[9283] was attempted by "/root/syz-executor.0"[20906] [ 580.663755] kobject: 'loop3' (ffff8880a4a82ea0): kobject_uevent_env [ 580.673921] ptrace attach of "/root/syz-executor.5"[20101] was attempted by "/root/syz-executor.5"[20908] 03:35:27 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r1 = dup(r0) getsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f00000004c0)=""/200, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0xe476, @loopback}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) ioprio_set$pid(0x1, r2, 0xd81) r3 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f0000000000)={'lapb0\x00', {0x2, 0x4e24, @broadcast}}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) fcntl$getownex(r5, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r6, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) ptrace$setregset(0x4205, r6, 0x605, &(0x7f0000000140)={&(0x7f0000000080)="07299aae48119f25", 0x8}) sendmsg$nl_netfilter(r4, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)=0x3f) ftruncate(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x135, 0x0, 0x0, 0xffffffffffff8000, 0x2000000, 0x0, 0x1000, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffff3e4b, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000001640)='./file0\x00', &(0x7f0000001680)='trusted.overlay.upper\x00', &(0x7f00000016c0)=ANY=[@ANYBLOB='\x00\x00\x00'], 0x1, 0x3) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) r7 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) clock_gettime(0x0, 0x0) ftruncate(r7, 0x2007fff) sendfile(r1, r7, 0x0, 0x87ff7) [ 580.685620] kobject: 'loop3' (ffff8880a4a82ea0): fill_kobj_path: path = '/devices/virtual/block/loop3' 03:35:27 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2d, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) [ 580.730352] kobject: 'loop3' (ffff8880a4a82ea0): kobject_uevent_env [ 580.747008] kobject: 'loop3' (ffff8880a4a82ea0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 580.761362] kobject: '0:43' (ffff8880629f8190): kobject_uevent_env [ 580.767936] kobject: '0:43' (ffff8880629f8190): fill_kobj_path: path = '/devices/virtual/bdi/0:43' [ 580.778357] kobject: 'loop3' (ffff8880a4a82ea0): kobject_uevent_env [ 580.785979] kobject: '0:43' (ffff8880629f8190): kobject_cleanup, parent (null) [ 580.798919] kobject: '0:43' (ffff8880629f8190): calling ktype release [ 580.799225] kobject: 'loop3' (ffff8880a4a82ea0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 580.807171] kobject: '0:43': free name [ 580.841354] kobject: 'loop4' (ffff8880a4abd7a0): kobject_uevent_env [ 580.857804] kobject: 'loop4' (ffff8880a4abd7a0): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 580.878956] kobject: 'loop2' (ffff8880a4a1ae20): kobject_uevent_env 03:35:27 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xedf2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000280)={@multicast2, @dev}, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(0x0, &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$revoke(0x3, r1) keyctl$unlink(0x6, r1, 0x0) keyctl$instantiate_iov(0x14, r1, 0x0, 0x0, 0x0) [ 580.894553] kobject: 'loop2' (ffff8880a4a1ae20): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 580.955234] kobject: 'loop4' (ffff8880a4abd7a0): kobject_uevent_env [ 580.965438] kobject: 'loop4' (ffff8880a4abd7a0): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:35:27 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2d, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb5, 0x3ac, &(0x7f00000001c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2012}, 0x28) 03:35:27 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000200)='threaded\b', 0x175d900f) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) 03:35:27 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) dup(r0) getsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f00000004c0)=""/200, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0xe476, @loopback}, 0x1c) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) ioprio_set$pid(0x1, r1, 0xd81) r2 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000000)={'lapb0\x00', {0x2, 0x4e24, @broadcast}}) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r5, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) ptrace$setregset(0x4205, r5, 0x605, &(0x7f0000000140)={&(0x7f0000000080)="07299aae48119f25", 0x8}) sendmsg$nl_netfilter(r3, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)=0x3f) ftruncate(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x135, 0x0, 0x0, 0xffffffffffff8000, 0x2000000, 0x0, 0x1000, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffff3e4b, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000001640)='./file0\x00', &(0x7f0000001680)='trusted.overlay.upper\x00', &(0x7f00000016c0)=ANY=[@ANYBLOB='\x00\x00\x00'], 0x1, 0x3) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) r6 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) clock_gettime(0x0, 0x0) ftruncate(r6, 0x2007fff) 03:35:27 executing program 5: r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r1 = dup(r0) getsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f00000004c0)=""/200, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0xe476, @loopback}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) ioprio_set$pid(0x1, r2, 0xd81) r3 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f0000000000)={'lapb0\x00', {0x2, 0x4e24, @broadcast}}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) fcntl$getownex(r5, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r6, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) ptrace$setregset(0x4205, r6, 0x605, &(0x7f0000000140)={&(0x7f0000000080)="07299aae48119f25", 0x8}) sendmsg$nl_netfilter(r4, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)=0x3f) ftruncate(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x135, 0x0, 0x0, 0xffffffffffff8000, 0x2000000, 0x0, 0x1000, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffff3e4b, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000001640)='./file0\x00', &(0x7f0000001680)='trusted.overlay.upper\x00', &(0x7f00000016c0)=ANY=[@ANYBLOB='\x00\x00\x00'], 0x1, 0x3) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) r7 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) clock_gettime(0x0, 0x0) sendfile(r1, r7, 0x0, 0x87ff7) 03:35:27 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xedf2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000280)={@multicast2, @dev}, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(0x0, &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$revoke(0x3, r1) keyctl$instantiate_iov(0x14, r1, 0x0, 0x0, 0x0) [ 580.997626] ptrace attach of "/root/syz-executor.2"[6837] was attempted by "/root/syz-executor.2"[20927] 03:35:27 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r1 = dup(r0) getsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f00000004c0)=""/200, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0xe476, @loopback}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) ioprio_set$pid(0x1, r2, 0xd81) r3 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f0000000000)={'lapb0\x00', {0x2, 0x4e24, @broadcast}}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) fcntl$getownex(r5, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r6, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) ptrace$setregset(0x4205, r6, 0x605, &(0x7f0000000140)={&(0x7f0000000080)="07299aae48119f25", 0x8}) sendmsg$nl_netfilter(r4, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)=0x3f) ftruncate(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x135, 0x0, 0x0, 0xffffffffffff8000, 0x2000000, 0x0, 0x1000, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffff3e4b, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000001640)='./file0\x00', &(0x7f0000001680)='trusted.overlay.upper\x00', &(0x7f00000016c0)=ANY=[@ANYBLOB='\x00\x00\x00'], 0x1, 0x3) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) r7 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) clock_gettime(0x0, 0x0) ftruncate(r7, 0x2007fff) sendfile(r1, r7, 0x0, 0x87ff7) 03:35:27 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xedf2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000280)={@multicast2, @dev}, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(0x0, &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, r1, 0x0, 0x0, 0x0) 03:35:27 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2e, &(0x7f0000000040)=ANY=[@ANYBLOB="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