4a40200010000100700000000000000000000000c09", 0x7a}], 0x0, 0x0) 07:39:07 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) sendmmsg(r0, &(0x7f0000000440), 0x400000000000294, 0x0) 07:39:07 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0x0, 0x0}) syz_open_procfs(0x0, &(0x7f0000000180)='attr\x00') fchdir(0xffffffffffffffff) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 07:39:07 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team_slave_0\x00', 0x1000}) r2 = socket$inet6(0xa, 0x800, 0x20) ioctl(r0, 0x8910, &(0x7f0000000080)="15") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002cc0)='./cgroup.net/syz1\'\xde\x96\xd4\x86z>I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='attr\x00') fchdir(r1) sendmmsg(r0, 0x0, 0x0, 0x0) 07:39:08 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='attr\x00') fchdir(r1) sendmmsg(r0, 0x0, 0x0, 0x0) 07:39:08 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/audio\x00', 0x80000042801, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000240)) ppoll(&(0x7f00000002c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) write$capi20_data(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="10400101e6cfca3b53000000010000ec00906fe60b68139d2d4bb18fdfb2c66ff82aca59f26b1e958d25e8c4591468577a9107ae1fa2ac2fd863b978e957a895378c7f"], 0x43) close(r1) 07:39:08 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) bind$packet(r0, &(0x7f0000000080), 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="01000000000000003d00010006800007"], 0x10}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000000440), 0x400000000000294, 0x0) 07:39:08 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team_slave_0\x00', 0x1000}) r2 = socket$inet6(0xa, 0x800, 0x20) ioctl(r0, 0x8910, &(0x7f0000000080)="15") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002cc0)='./cgroup.net/syz1\'\xde\x96\xd4\x86z>I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='attr\x00') fchdir(r1) sendmmsg(r0, 0x0, 0x0, 0x0) 07:39:08 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) bind$packet(r0, &(0x7f0000000080), 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="01000000000000003d00010006800007"], 0x10}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000000440), 0x400000000000294, 0x0) [ 819.558092][T12943] XFS (loop2): SB sanity check failed [ 819.572683][T12943] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x43b/0x570, xfs_sb block 0xffffffffffffffff 07:39:08 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/audio\x00', 0x80000042801, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000240)) ppoll(&(0x7f00000002c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) write$capi20_data(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="10400101e6cfca3b53000000010000ec00906fe60b68139d2d4bb18fdfb2c66ff82aca59f26b1e958d25e8c4591468577a9107ae1fa2ac2fd863b978e957a895378c7f"], 0x43) close(r1) [ 819.653815][T12943] XFS (loop2): Unmount and run xfs_repair [ 819.668574][T12943] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 819.682537][T12943] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 819.700688][T12943] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 819.710612][T12943] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 819.720122][T12943] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 819.744346][T12943] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 819.773315][T12943] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 819.805810][T12943] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 819.814859][T12943] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 819.835652][T11301] XFS (loop2): SB validate failed with error -117. 07:39:09 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c090804", 0x7c}], 0x0, 0x0) 07:39:09 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}], 0x1, 0x0) 07:39:09 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team_slave_0\x00', 0x1000}) r2 = socket$inet6(0xa, 0x800, 0x20) ioctl(r0, 0x8910, &(0x7f0000000080)="15") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002cc0)='./cgroup.net/syz1\'\xde\x96\xd4\x86z>I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}], 0x1, 0x0) 07:39:09 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, r0}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="01000000000000003d00010006800007"], 0x10}}], 0x1, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000440), 0x400000000000294, 0x0) 07:39:09 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/audio\x00', 0x80000042801, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000240)) ppoll(&(0x7f00000002c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) write$capi20_data(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="10400101e6cfca3b53000000010000ec00906fe60b68139d2d4bb18fdfb2c66ff82aca59f26b1e958d25e8c4591468577a9107ae1fa2ac2fd863b978e957a895378c7f55b3c2ca2f65c70529b66daf0f0cb52d86ab4934f7222186efbb950dafd4c9c9e4"], 0x64) close(r1) 07:39:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001180)="11dca5055e0bcfec7be070") r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000040), 0x400000000000117, 0x0) ppoll(&(0x7f00000000c0)=[{r2, 0x8044}], 0x1, 0x0, 0x0, 0x0) ppoll(&(0x7f0000000100)=[{r2, 0xff}], 0x1, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 07:39:09 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}], 0x1, 0x0) 07:39:09 executing program 4: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, r0}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="01000000000000003d00010006800007"], 0x10}}], 0x1, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000440), 0x400000000000294, 0x0) 07:39:09 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team_slave_0\x00', 0x1000}) r2 = socket$inet6(0xa, 0x800, 0x20) ioctl(r0, 0x8910, &(0x7f0000000080)="15") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002cc0)='./cgroup.net/syz1\'\xde\x96\xd4\x86z>I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, r0}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="01000000000000003d00010006800007"], 0x10}}], 0x1, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000440), 0x400000000000294, 0x0) 07:39:10 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/audio\x00', 0x80000042801, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000240)) ppoll(&(0x7f00000002c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) write$capi20_data(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="10400101e6cfca3b53000000010000ec00906fe60b68139d2d4bb18fdfb2c66ff82aca59f26b1e958d25e8c4591468577a9107ae1fa2ac2fd863b978e957a895378c7f"], 0x43) close(r1) 07:39:10 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{0x0, 0x0, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 07:39:10 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team_slave_0\x00', 0x1000}) r2 = socket$inet6(0xa, 0x800, 0x20) ioctl(r0, 0x8910, &(0x7f0000000080)="15") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002cc0)='./cgroup.net/syz1\'\xde\x96\xd4\x86z>I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{0x0, 0x0, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 07:39:10 executing program 4: r0 = socket(0x0, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="01000000000000003d00010006800007"], 0x10}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000000440), 0x400000000000294, 0x0) 07:39:10 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/audio\x00', 0x80000042801, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000240)) ppoll(&(0x7f00000002c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) write$capi20_data(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="10400101e6cfca3b53000000010000ec00906fe60b68139d2d4bb18fdfb2c66ff82aca59f26b1e958d25e8c4591468577a9107ae1fa2ac2fd863b978e957a895378c7f"], 0x43) close(r1) 07:39:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001180)="11dca5055e0bcfec7be070") r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000040), 0x400000000000117, 0x0) ppoll(&(0x7f00000000c0)=[{r2, 0x8044}], 0x1, 0x0, 0x0, 0x0) ppoll(&(0x7f0000000100)=[{r2, 0xff}], 0x1, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 07:39:10 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{0x0, 0x0, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 07:39:10 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team_slave_0\x00', 0x1000}) r2 = socket$inet6(0xa, 0x800, 0x20) ioctl(r0, 0x8910, &(0x7f0000000080)="15") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002cc0)='./cgroup.net/syz1\'\xde\x96\xd4\x86z>I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="01000000000000003d00010006800007"], 0x10}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000000440), 0x400000000000294, 0x0) 07:39:11 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 07:39:11 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/audio\x00', 0x80000042801, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000240)) ppoll(&(0x7f00000002c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) write$capi20_data(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="10400101e6cfca3b53000000010000ec00906fe60b68139d2d4bb18fdfb2c66ff82aca59f26b1e958d25e8c4591468577a9107ae1fa2ac2fd863b978e957a895378c7f55b3c2ca2f65c70529b66daf0f0cb52d86"], 0x54) close(r1) 07:39:11 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team_slave_0\x00', 0x1000}) r2 = socket$inet6(0xa, 0x800, 0x20) ioctl(r0, 0x8910, &(0x7f0000000080)="15") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002cc0)='./cgroup.net/syz1\'\xde\x96\xd4\x86z>I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 07:39:11 executing program 4: r0 = socket(0x0, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="01000000000000003d00010006800007"], 0x10}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000000440), 0x400000000000294, 0x0) 07:39:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001180)="11dca5055e0bcfec7be070") r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000040), 0x400000000000117, 0x0) ppoll(&(0x7f00000000c0)=[{r2, 0x8044}], 0x1, 0x0, 0x0, 0x0) ppoll(&(0x7f0000000100)=[{r2, 0xff}], 0x1, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 07:39:11 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/audio\x00', 0x80000042801, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000240)) ppoll(&(0x7f00000002c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) write$capi20_data(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="10400101e6cfca3b53000000010000ec00906fe60b68139d2d4bb18fdfb2c66ff82aca59f26b1e958d25e8c4591468577a9107ae1fa2ac2fd863b978e957a895378c7f55b3c2ca2f65c70529b66daf0f0cb52d86"], 0x54) close(r1) 07:39:11 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team_slave_0\x00', 0x1000}) r2 = socket$inet6(0xa, 0x800, 0x20) ioctl(r0, 0x8910, &(0x7f0000000080)="15") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002cc0)='./cgroup.net/syz1\'\xde\x96\xd4\x86z>I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 822.600658][T11573] XFS (loop2): SB sanity check failed [ 822.626131][T11573] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x43b/0x570, xfs_sb block 0xffffffffffffffff 07:39:11 executing program 4: r0 = socket(0x200000000000011, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="01000000000000003d00010006800007"], 0x10}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000000440), 0x400000000000294, 0x0) [ 822.701422][T11573] XFS (loop2): Unmount and run xfs_repair [ 822.735250][T11573] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 822.773814][T11573] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 822.836785][T11573] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 822.905446][T11573] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 822.936738][T11573] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 822.965897][T11573] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 822.984855][T11573] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 822.994233][T11573] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 823.004155][T11573] 00000070: 00 00 00 00 00 00 00 00 0c 09 08 04 00 00 00 00 ................ [ 823.013594][T11573] XFS (loop2): SB validate failed with error -117. 07:39:12 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0x80, 0x0, 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 07:39:12 executing program 4: r0 = socket(0x200000000000011, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="01000000000000003d00010006800007"], 0x10}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000000440), 0x400000000000294, 0x0) 07:39:12 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/audio\x00', 0x80000042801, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000240)) ppoll(&(0x7f00000002c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) write$capi20_data(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="10400101e6cfca3b53000000010000ec00906fe60b68139d2d4bb18fdfb2c66ff82aca59f26b1e958d25e8c4591468577a9107ae1fa2ac2fd863b978e957a895378c7f55b3c2ca2f65c70529b66daf0f0cb52d86"], 0x54) close(r1) 07:39:12 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team_slave_0\x00', 0x1000}) r2 = socket$inet6(0xa, 0x800, 0x20) ioctl(r0, 0x8910, &(0x7f0000000080)="15") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002cc0)='./cgroup.net/syz1\'\xde\x96\xd4\x86z>I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="01000000000000003d00010006800007"], 0x10}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000000440), 0x400000000000294, 0x0) 07:39:12 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r1, &(0x7f0000000480)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000640)="96", 0x1, 0x3fff, 0x0, 0x0) sendmsg$unix(r1, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000006c0)="89", 0x1}], 0x1}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB], 0x1}}, 0x1) 07:39:12 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/audio\x00', 0x80000042801, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000240)) ppoll(&(0x7f00000002c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) write$capi20_data(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="10400101e6cfca3b53000000010000ec00906fe60b68139d2d4bb18fdfb2c66ff82aca59f26b1e958d25e8c4591468577a9107ae1fa2ac2fd863b978e957a895378c7f55b3c2ca2f65c70529b66daf0f0cb52d86ab4934f7222186ef"], 0x5c) close(r1) 07:39:12 executing program 2: r0 = socket$inet(0x2, 0x4000080000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000240)="03c3bd162e0ee0dde5d599a620a803f6ad43a1d117e98cdc487ca916bd091ff17647084cd6263838aa651527103f1b461f209904462988c459b7493c60bc15f460fce306cc6f57a1895bd1811272b7bc23a6387962e5c3538513b611a01b5211ceb0668cac1250f9a8f307ca14578842f02a13352d612cc6e814318d7a30bc8b7085442e55f8be35d1653407146fb619803bc050f4c8b663c4130028b466607ffd827f7464d072a2c89c4c864fe87431b2314a44c0bcaa31844b7accfb0fce6fc0cd5eab06cab493a2", 0xc9, 0x0, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000540)="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", 0x2c4}], 0x1}, 0x0) close(r0) 07:39:12 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0x80, 0x0, 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 07:39:12 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="01000000000000003d00010006800007"], 0x10}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000000440), 0x400000000000294, 0x0) 07:39:12 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team_slave_0\x00', 0x1000}) r2 = socket$inet6(0xa, 0x800, 0x20) ioctl(r0, 0x8910, &(0x7f0000000080)="15") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002cc0)='./cgroup.net/syz1\'\xde\x96\xd4\x86z>I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0x80, 0x0, 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 07:39:12 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/audio\x00', 0x80000042801, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000240)) ppoll(&(0x7f00000002c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) write$capi20_data(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="10400101e6cfca3b53000000010000ec00906fe60b68139d2d4bb18fdfb2c66ff82aca59f26b1e958d25e8c4591468577a9107ae1fa2ac2fd863b978e957a895378c7f55b3c2ca2f65c70529b66daf0f0cb52d86ab4934f7222186ef"], 0x5c) close(r1) 07:39:12 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="01000000000000003d00010006800007"], 0x10}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000000440), 0x400000000000294, 0x0) 07:39:13 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f0000007380)}}], 0x2, 0x0) 07:39:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001180)="11dca5055e0bcfec7be070") r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000040), 0x400000000000117, 0x0) ppoll(&(0x7f00000000c0)=[{r2, 0x8044}], 0x1, 0x0, 0x0, 0x0) ppoll(&(0x7f0000000100)=[{r2, 0xff}], 0x1, 0x0, 0x0, 0x0) dup3(r2, 0xffffffffffffffff, 0x0) 07:39:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x8, 0x10002) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 07:39:13 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="01000000000000003d00010006800007"], 0x10}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000000440), 0x400000000000294, 0x0) 07:39:13 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/audio\x00', 0x80000042801, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000240)) ppoll(&(0x7f00000002c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) write$capi20_data(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="10400101e6cfca3b53000000010000ec00906fe60b68139d2d4bb18fdfb2c66ff82aca59f26b1e958d25e8c4591468577a9107ae1fa2ac2fd863b978e957a895378c7f55b3c2ca2f65c70529b66daf0f0cb52d86ab4934f7222186ef"], 0x5c) close(r1) 07:39:13 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team_slave_0\x00', 0x1000}) r2 = socket$inet6(0xa, 0x800, 0x20) ioctl(r0, 0x8910, &(0x7f0000000080)="15") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002cc0)='./cgroup.net/syz1\'\xde\x96\xd4\x86z>I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f0000007380)}}], 0x2, 0x0) 07:39:13 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f0000007380)}}], 0x2, 0x0) 07:39:13 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) bind$packet(r0, &(0x7f0000000080), 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="01000000000000003d00010006800007"], 0x10}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000000440), 0x400000000000294, 0x0) 07:39:13 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/audio\x00', 0x80000042801, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000240)) ppoll(&(0x7f00000002c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) write$capi20_data(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="10400101e6cfca3b53000000010000ec00906fe60b68139d2d4bb18fdfb2c66ff82aca59f26b1e958d25e8c4591468577a9107ae1fa2ac2fd863b978e957a895378c7f55b3c2ca2f65c70529b66daf0f0cb52d86ab4934f7222186efbb950daf"], 0x60) close(r1) 07:39:13 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team_slave_0\x00', 0x1000}) r2 = socket$inet6(0xa, 0x800, 0x20) ioctl(r0, 0x8910, &(0x7f0000000080)="15") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002cc0)='./cgroup.net/syz1\'\xde\x96\xd4\x86z>I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x1, 0x0) 07:39:13 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) bind$packet(r0, &(0x7f0000000080), 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="01000000000000003d00010006800007"], 0x10}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000000440), 0x400000000000294, 0x0) 07:39:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001180)="11dca5055e0bcfec7be070") r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r2, &(0x7f0000000040), 0x400000000000117, 0x0) ppoll(&(0x7f00000000c0)=[{r2, 0x8044}], 0x1, 0x0, 0x0, 0x0) ppoll(&(0x7f0000000100)=[{r2, 0xff}], 0x1, 0x0, 0x0, 0x0) dup3(r2, 0xffffffffffffffff, 0x0) 07:39:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x8, 0x10002) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 07:39:15 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/audio\x00', 0x80000042801, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000240)) ppoll(&(0x7f00000002c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) write$capi20_data(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="10400101e6cfca3b53000000010000ec00906fe60b68139d2d4bb18fdfb2c66ff82aca59f26b1e958d25e8c4591468577a9107ae1fa2ac2fd863b978e957a895378c7f55b3c2ca2f65c70529b66daf0f0cb52d86ab4934f7222186ef"], 0x5c) close(r1) 07:39:15 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x1, 0x0) 07:39:15 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team_slave_0\x00', 0x1000}) r2 = socket$inet6(0xa, 0x800, 0x20) ioctl(r0, 0x8910, &(0x7f0000000080)="15") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002cc0)='./cgroup.net/syz1\'\xde\x96\xd4\x86z>I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x1, 0x0) 07:39:15 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="01000000000000003d00010006800007"], 0x10}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000000440), 0x400000000000294, 0x0) 07:39:15 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team_slave_0\x00', 0x1000}) r2 = socket$inet6(0xa, 0x800, 0x20) ioctl(r0, 0x8910, &(0x7f0000000080)="15") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002cc0)='./cgroup.net/syz1\'\xde\x96\xd4\x86z>I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="01000000000000003d00010006800007"], 0x10}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000000440), 0x400000000000294, 0x0) 07:39:15 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 07:39:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x8, 0x10002) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 07:39:16 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/audio\x00', 0x80000042801, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000240)) ppoll(&(0x7f00000002c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) write$capi20_data(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="10400101e6cfca3b53000000010000ec00906fe60b68139d2d4bb18fdfb2c66ff82aca59f26b1e958d25e8c4591468577a9107ae1fa2ac2fd863b978e957a895378c7f55b3c2ca2f65c70529b66daf0f0cb52d86ab4934f7222186ef"], 0x5c) close(r1) 07:39:16 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team_slave_0\x00', 0x1000}) r2 = socket$inet6(0xa, 0x800, 0x20) ioctl(r0, 0x8910, &(0x7f0000000080)="15") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002cc0)='./cgroup.net/syz1\'\xde\x96\xd4\x86z>I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="01000000000000003d00010006800007"], 0x10}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000000440), 0x400000000000294, 0x0) 07:39:16 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 07:39:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 07:39:16 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00'}) bind$packet(r0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="01000000000000003d00010006800007"], 0x10}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000000440), 0x400000000000294, 0x0) 07:39:16 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/audio\x00', 0x80000042801, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000240)) ppoll(&(0x7f00000002c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) write$capi20_data(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="10400101e6cfca3b53000000010000ec00906fe60b68139d2d4bb18fdfb2c66ff82aca59f26b1e958d25e8c4591468577a9107ae1fa2ac2fd863b978e957a895378c7f55b3c2ca2f65c70529b66daf0f0cb52d86ab4934f7222186efbb95"], 0x5e) close(r1) 07:39:16 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 07:39:16 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team_slave_0\x00', 0x1000}) r2 = socket$inet6(0xa, 0x800, 0x20) ioctl(r0, 0x8910, &(0x7f0000000080)="15") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002cc0)='./cgroup.net/syz1\'\xde\x96\xd4\x86z>I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000440), 0x400000000000294, 0x0) 07:39:19 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 07:39:19 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/audio\x00', 0x80000042801, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000240)) ppoll(&(0x7f00000002c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) write$capi20_data(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="10400101e6cfca3b53000000010000ec00906fe60b68139d2d4bb18fdfb2c66ff82aca59f26b1e958d25e8c4591468577a9107ae1fa2ac2fd863b978e957a895378c7f55b3c2ca2f65c70529b66daf0f0cb52d86ab4934f7222186efbb950d"], 0x5f) close(r1) 07:39:20 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000440), 0x400000000000294, 0x0) 07:39:20 executing program 1: r0 = openat$full(0xffffffffffffff9c, 0x0, 0xc00, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x36b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=@srh, 0x8) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r1, &(0x7f0000000440), 0x400000000000419, 0x810) dup(0xffffffffffffffff) getuid() ioctl$PPPIOCDISCONN(r0, 0x7439) r2 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x20, 0x0) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000140)=0x1) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f0000000100)) ioctl$FS_IOC_GETVERSION(r2, 0x80087601, &(0x7f00000000c0)) ioctl$TUNSETIFINDEX(r0, 0x400454da, 0x0) 07:39:20 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/audio\x00', 0x80000042801, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000240)) ppoll(&(0x7f00000002c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) write$capi20_data(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="10400101e6cfca3b53000000010000ec00906fe60b68139d2d4bb18fdfb2c66ff82aca59f26b1e958d25e8c4591468577a9107ae1fa2ac2fd863b978e957a895378c7f55b3c2ca2f65c70529b66daf0f0cb52d86ab4934f7222186efbb950d"], 0x5f) close(r1) 07:39:20 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team_slave_0\x00', 0x1000}) r2 = socket$inet6(0xa, 0x800, 0x20) ioctl(r0, 0x8910, &(0x7f0000000080)="15") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002cc0)='./cgroup.net/syz1\'\xde\x96\xd4\x86z>I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0xb) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000940)=r2) 07:39:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$IOC_PR_RELEASE(r1, 0x401070ca, 0x0) 07:39:20 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000440), 0x400000000000294, 0x0) 07:39:20 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/audio\x00', 0x80000042801, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000240)) ppoll(&(0x7f00000002c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) write$capi20_data(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="10400101e6cfca3b53000000010000ec00906fe60b68139d2d4bb18fdfb2c66ff82aca59f26b1e958d25e8c4591468577a9107ae1fa2ac2fd863b978e957a895378c7f55b3c2ca2f65c70529b66daf0f0cb52d86ab4934f7222186efbb950daf"], 0x60) close(0xffffffffffffffff) 07:39:20 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team_slave_0\x00', 0x1000}) r2 = socket$inet6(0xa, 0x800, 0x20) ioctl(r0, 0x8910, &(0x7f0000000080)="15") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002cc0)='./cgroup.net/syz1\'\xde\x96\xd4\x86z>I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0xb) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000940)=r2) 07:39:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000180)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 07:39:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7b") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000180)={'lo\x00'}) 07:39:21 executing program 1: 07:39:21 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team_slave_0\x00', 0x1000}) r2 = socket$inet6(0xa, 0x800, 0x20) ioctl(r0, 0x8910, &(0x7f0000000080)="15") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002cc0)='./cgroup.net/syz1\'\xde\x96\xd4\x86z>I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80), 0x0, 0x0) sendmmsg(r0, &(0x7f0000000440), 0x400000000000294, 0x0) 07:39:21 executing program 1: 07:39:21 executing program 1: 07:39:21 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80), 0x0, 0x0) sendmmsg(r0, &(0x7f0000000440), 0x400000000000294, 0x0) 07:39:21 executing program 1: 07:39:21 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/audio\x00', 0x80000042801, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000240)) ppoll(&(0x7f00000002c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) write$capi20_data(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="10400101e6cfca3b53000000010000ec00906fe60b68139d2d4bb18fdfb2c66ff82aca59f26b1e958d25e8c4591468577a9107ae1fa2ac2fd863b978e957a895378c7f55b3c2ca2f65c70529b66daf0f0cb52d86ab4934f7222186efbb950daf"], 0x60) close(0xffffffffffffffff) 07:39:21 executing program 1: 07:39:21 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80), 0x0, 0x0) sendmmsg(r0, &(0x7f0000000440), 0x400000000000294, 0x0) 07:39:22 executing program 5: 07:39:22 executing program 2: 07:39:22 executing program 1: 07:39:22 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team_slave_0\x00', 0x1000}) r2 = socket$inet6(0xa, 0x800, 0x20) ioctl(r0, 0x8910, &(0x7f0000000080)="15") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002cc0)='./cgroup.net/syz1\'\xde\x96\xd4\x86z>I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000000440), 0x400000000000294, 0x0) 07:39:22 executing program 1: 07:39:22 executing program 5: 07:39:22 executing program 2: 07:39:22 executing program 1: 07:39:22 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/audio\x00', 0x80000042801, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000240)) ppoll(&(0x7f00000002c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) write$capi20_data(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="10400101e6cfca3b53000000010000ec00906fe60b68139d2d4bb18fdfb2c66ff82aca59f26b1e958d25e8c4591468577a9107ae1fa2ac2fd863b978e957a895378c7f55b3c2ca2f65c70529b66daf0f0cb52d86ab4934f7222186efbb950daf"], 0x60) close(0xffffffffffffffff) 07:39:22 executing program 5: 07:39:22 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team_slave_0\x00', 0x1000}) r2 = socket$inet6(0xa, 0x800, 0x20) ioctl(r0, 0x8910, &(0x7f0000000080)="15") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002cc0)='./cgroup.net/syz1\'\xde\x96\xd4\x86z>I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000000440), 0x400000000000294, 0x0) 07:39:22 executing program 1: 07:39:22 executing program 2: 07:39:22 executing program 5: 07:39:22 executing program 2: 07:39:22 executing program 1: 07:39:22 executing program 1: 07:39:22 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team_slave_0\x00', 0x1000}) r2 = socket$inet6(0xa, 0x800, 0x20) ioctl(r0, 0x8910, &(0x7f0000000080)="15") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002cc0)='./cgroup.net/syz1\'\xde\x96\xd4\x86z>I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000000440), 0x400000000000294, 0x0) 07:39:23 executing program 1: 07:39:23 executing program 2: 07:39:23 executing program 3: 07:39:23 executing program 1: 07:39:23 executing program 5: 07:39:23 executing program 2: 07:39:23 executing program 3: 07:39:23 executing program 5: 07:39:23 executing program 2: 07:39:23 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team_slave_0\x00', 0x1000}) r2 = socket$inet6(0xa, 0x800, 0x20) ioctl(r0, 0x8910, &(0x7f0000000080)="15") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002cc0)='./cgroup.net/syz1\'\xde\x96\xd4\x86z>I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[]}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000000440), 0x400000000000294, 0x0) 07:39:23 executing program 1: 07:39:23 executing program 2: 07:39:24 executing program 5: 07:39:24 executing program 1: 07:39:24 executing program 3: 07:39:24 executing program 1: 07:39:24 executing program 5: 07:39:24 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team_slave_0\x00', 0x1000}) r2 = socket$inet6(0xa, 0x800, 0x20) ioctl(r0, 0x8910, &(0x7f0000000080)="15") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002cc0)='./cgroup.net/syz1\'\xde\x96\xd4\x86z>I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[]}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000000440), 0x400000000000294, 0x0) 07:39:24 executing program 5: 07:39:24 executing program 2: 07:39:24 executing program 3: 07:39:24 executing program 5: 07:39:24 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team_slave_0\x00', 0x1000}) r2 = socket$inet6(0xa, 0x800, 0x20) ioctl(r0, 0x8910, &(0x7f0000000080)="15") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002cc0)='./cgroup.net/syz1\'\xde\x96\xd4\x86z>I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[]}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000000440), 0x400000000000294, 0x0) 07:39:24 executing program 1: 07:39:24 executing program 3: 07:39:24 executing program 2: 07:39:24 executing program 5: 07:39:25 executing program 1: 07:39:25 executing program 3: 07:39:25 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team_slave_0\x00', 0x1000}) r2 = socket$inet6(0xa, 0x800, 0x20) ioctl(r0, 0x8910, &(0x7f0000000080)="15") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002cc0)='./cgroup.net/syz1\'\xde\x96\xd4\x86z>I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB]}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000000440), 0x400000000000294, 0x0) 07:39:25 executing program 3: 07:39:25 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) request_key(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) 07:39:25 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x3) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000300)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0xfffffffffffffffd}) ioctl$KVM_SET_SREGS(r2, 0xc018ae85, &(0x7f0000000440)) 07:39:25 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team_slave_0\x00', 0x1000}) r2 = socket$inet6(0xa, 0x800, 0x20) ioctl(r0, 0x8910, &(0x7f0000000080)="15") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002cc0)='./cgroup.net/syz1\'\xde\x96\xd4\x86z>I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB]}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000000440), 0x400000000000294, 0x0) 07:39:26 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team_slave_0\x00', 0x1000}) r2 = socket$inet6(0xa, 0x800, 0x20) ioctl(r0, 0x8910, &(0x7f0000000080)="15") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002cc0)='./cgroup.net/syz1\'\xde\x96\xd4\x86z>I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB]}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000000440), 0x400000000000294, 0x0) 07:39:26 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team_slave_0\x00', 0x1000}) r2 = socket$inet6(0xa, 0x800, 0x20) ioctl(r0, 0x8910, &(0x7f0000000080)="15") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002cc0)='./cgroup.net/syz1\'\xde\x96\xd4\x86z>I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000000000000"], 0x8}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000000440), 0x400000000000294, 0x0) 07:39:27 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r2, 0x1, 0xd, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$llc(r1, &(0x7f0000000440)=""/103, 0x67, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={r3, 0x28, &(0x7f0000000280)}, 0x10) getsockopt$inet6_buf(r2, 0x29, 0x3f, &(0x7f00000005c0)=""/24, &(0x7f0000000600)=0x18) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000200), &(0x7f0000000240)=0x4) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f0000000140)) listen(r2, 0x7) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0x0, 0x10001}, 0xc) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) r5 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f00000001c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, 0x0) connect$bt_sco(r1, &(0x7f0000000080)={0x1f, {0x40, 0x138b, 0x3, 0xffff, 0x3, 0xd9e}}, 0x8) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f00000002c0)=""/234) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) close(r5) pipe(&(0x7f0000000100)) 07:39:27 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team_slave_0\x00', 0x1000}) r2 = socket$inet6(0xa, 0x800, 0x20) ioctl(r0, 0x8910, &(0x7f0000000080)="15") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002cc0)='./cgroup.net/syz1\'\xde\x96\xd4\x86z>I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000000000000"], 0x8}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000000440), 0x400000000000294, 0x0) 07:39:28 executing program 5: ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, &(0x7f0000000300)) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) syz_open_dev$dmmidi(&(0x7f00000002c0)='/dev/dmmidi#\x00', 0x0, 0x0) sendto$inet(r0, 0x0, 0x2ba, 0x400200007fe, &(0x7f00000000c0)={0x2, 0x4004e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff012}], 0x1, &(0x7f0000000200)=""/20, 0xd57}, 0x300) 07:39:28 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team_slave_0\x00', 0x1000}) r2 = socket$inet6(0xa, 0x800, 0x20) ioctl(r0, 0x8910, &(0x7f0000000080)="15") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002cc0)='./cgroup.net/syz1\'\xde\x96\xd4\x86z>I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000000000000"], 0x8}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000000440), 0x400000000000294, 0x0) 07:39:28 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r2, 0x1, 0xd, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$llc(r1, &(0x7f0000000440)=""/103, 0x67, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={r3, 0x28, &(0x7f0000000280)}, 0x10) getsockopt$inet6_buf(r2, 0x29, 0x3f, &(0x7f00000005c0)=""/24, &(0x7f0000000600)=0x18) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000200), &(0x7f0000000240)=0x4) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f0000000140)) listen(r2, 0x7) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0x0, 0x10001}, 0xc) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) r5 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f00000001c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, 0x0) connect$bt_sco(r1, &(0x7f0000000080)={0x1f, {0x40, 0x138b, 0x3, 0xffff, 0x3, 0xd9e}}, 0x8) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f00000002c0)=""/234) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) close(r5) pipe(&(0x7f0000000100)) 07:39:28 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team_slave_0\x00', 0x1000}) r2 = socket$inet6(0xa, 0x800, 0x20) ioctl(r0, 0x8910, &(0x7f0000000080)="15") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002cc0)='./cgroup.net/syz1\'\xde\x96\xd4\x86z>I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="01000000000000003d000100"], 0xc}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000000440), 0x400000000000294, 0x0) 07:39:29 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team_slave_0\x00', 0x1000}) r2 = socket$inet6(0xa, 0x800, 0x20) ioctl(r0, 0x8910, &(0x7f0000000080)="15") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002cc0)='./cgroup.net/syz1\'\xde\x96\xd4\x86z>I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="01000000000000003d000100"], 0xc}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000000440), 0x400000000000294, 0x0) 07:39:29 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000100)={'syz1\x00', {0x800, 0x0, 0x0, 0x5}, 0x1c, [0xfffffffffffffffc, 0x6, 0x7, 0x8, 0x6cb, 0x0, 0x0, 0xffffffffffffffff, 0xfff, 0x1ff, 0x1f, 0x2, 0x0, 0x46d, 0x3, 0x6, 0x4, 0x10000, 0xff, 0xe7a, 0x800, 0xde3b, 0xfff, 0x8, 0x0, 0x66d3, 0xb9c3, 0x8, 0x100, 0x7f, 0x0, 0xa382, 0x96, 0x20, 0xca0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x5, 0x0, 0x0, 0x0, 0x100, 0x39a, 0x0, 0x1, 0x0, 0x7, 0x4, 0x0, 0x71, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x5, 0x0, 0x0, 0x0, 0xa23], [0x0, 0x81, 0xffff, 0x1, 0x7f, 0x7f, 0x3, 0x0, 0x4, 0x3ff, 0x3c, 0x7f4, 0x1ff, 0x10001, 0xa7, 0x1, 0xdb, 0x800, 0x7fffffff, 0x7ff, 0x1, 0xf5, 0x20, 0x0, 0x0, 0x9, 0x0, 0x2, 0xff, 0x9, 0x2, 0x3, 0x0, 0x64, 0x1000, 0x0, 0x0, 0xfffffffffffffffe, 0x5, 0xfffffffffffffc3d, 0x6, 0x1, 0x0, 0x4, 0x3, 0x192, 0x0, 0x0, 0x81, 0x5e39, 0xd4, 0xf8e, 0x3, 0x80, 0x100000001, 0x2, 0x123c, 0x0, 0xfffffffffffffffe, 0xc65e, 0x0, 0x6, 0x6, 0x7], [0xfffffffffffffffe, 0x4, 0x2b07ed94, 0x3, 0x984, 0x9, 0x7, 0xfffffffffffffffd, 0xffffffffffff8001, 0x4, 0x3, 0x1, 0x8, 0x401, 0x0, 0x0, 0xbc53, 0x0, 0x8, 0x6, 0x4, 0x0, 0x3, 0x0, 0x80000001, 0x0, 0x3, 0x0, 0x7ff, 0xfffffffffffffffd, 0x9, 0x51b, 0x0, 0xa93f, 0x1, 0x9, 0x80, 0x3, 0x8, 0x3, 0x40, 0xffffffff, 0xec2b, 0x2, 0xfff, 0x81, 0x7, 0x0, 0x9, 0x508a, 0x116, 0x3f, 0x0, 0x3, 0x0, 0x0, 0x100000001, 0x11, 0x7, 0xbf9, 0x3ff, 0xff8000000, 0x9, 0x408000000000000], [0x8cf8, 0x8, 0x10000, 0x7ae, 0x1, 0x100000000, 0x2, 0x3ff, 0x100000000, 0x5, 0x3, 0xfffffffffffff001, 0xfff, 0x4, 0x80000001, 0xff, 0x0, 0x5, 0x1, 0x8, 0x80, 0x0, 0x7ff, 0x400, 0x5, 0x100000000, 0x9, 0x5, 0x6, 0x0, 0x10001, 0x9, 0x80000000, 0x1, 0x10001, 0x0, 0xd927, 0x9, 0x8, 0xc48, 0xfff, 0x0, 0x10000, 0x3edf, 0x10001, 0x23, 0x285d37e8, 0x0, 0x0, 0x7fff, 0x3f, 0xa164, 0x7ff, 0x0, 0x1, 0x0, 0x7, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x7]}, 0x45c) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='\x00\x00\x00\x00\x00\x00\x00\xd8\xb3\x16') ioctl$TIOCEXCL(r1, 0x540c) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x400000000000) 07:39:29 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team_slave_0\x00', 0x1000}) r2 = socket$inet6(0xa, 0x800, 0x20) ioctl(r0, 0x8910, &(0x7f0000000080)="15") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002cc0)='./cgroup.net/syz1\'\xde\x96\xd4\x86z>I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f000002eff0)={0x32b, &(0x7f0000000000)=[{}]}, 0x10) 07:39:29 executing program 3: mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x1, 0x44031, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') 07:39:29 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000001c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x800000000002b, 'pids'}]}, 0x6) r2 = socket$inet(0x2, 0x0, 0x400000000001d) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc5f123c123f319bd070") 07:39:29 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="01000000000000003d000100"], 0xc}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000000440), 0x400000000000294, 0x0) 07:39:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x5, 0x0, "e5962022b4d8616459411fabfb18fa815190fed36ae16ad93a0a03f11a7fa6e490f3f569d54322814262fd287928b10ed4dc615dd020c5a2228d0c75ea98cd797612c033bc2c3b88fef6317fbc00ab1e"}, 0xd8) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:39:30 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team_slave_0\x00', 0x1000}) r2 = socket$inet6(0xa, 0x800, 0x20) ioctl(r0, 0x8910, &(0x7f0000000080)="15") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002cc0)='./cgroup.net/syz1\'\xde\x96\xd4\x86z>I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="01000000000000003d0001000680"], 0xe}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000000440), 0x400000000000294, 0x0) [ 841.471921][T12494] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 07:39:30 executing program 5: 07:39:30 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team_slave_0\x00', 0x1000}) r2 = socket$inet6(0xa, 0x800, 0x20) ioctl(r0, 0x8910, &(0x7f0000000080)="15") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002cc0)='./cgroup.net/syz1\'\xde\x96\xd4\x86z>I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f000002eff0)={0x32b, &(0x7f0000000000)=[{}]}, 0x10) 07:39:30 executing program 5: 07:39:30 executing program 2: 07:39:30 executing program 5: 07:39:30 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team_slave_0\x00', 0x1000}) r2 = socket$inet6(0xa, 0x800, 0x20) ioctl(r0, 0x8910, &(0x7f0000000080)="15") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002cc0)='./cgroup.net/syz1\'\xde\x96\xd4\x86z>I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="01000000000000003d0001000680"], 0xe}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000000440), 0x400000000000294, 0x0) 07:39:30 executing program 5: 07:39:30 executing program 2: 07:39:30 executing program 5: 07:39:31 executing program 3: 07:39:31 executing program 2: 07:39:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = memfd_create(&(0x7f00000000c0)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff\xc8z', 0x0) write(r1, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="0700000000000000040000000000"], 0xe) sendfile(r1, r1, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f000002eff0)={0x32b, &(0x7f0000000000)=[{}]}, 0x10) 07:39:31 executing program 5: 07:39:31 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team_slave_0\x00', 0x1000}) r2 = socket$inet6(0xa, 0x800, 0x20) ioctl(r0, 0x8910, &(0x7f0000000080)="15") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002cc0)='./cgroup.net/syz1\'\xde\x96\xd4\x86z>I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="01000000000000003d0001000680"], 0xe}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000000440), 0x400000000000294, 0x0) 07:39:31 executing program 3: 07:39:31 executing program 3: 07:39:31 executing program 5: 07:39:31 executing program 2: 07:39:31 executing program 5: 07:39:31 executing program 3: 07:39:31 executing program 2: 07:39:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = memfd_create(&(0x7f00000000c0)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff\xc8z', 0x0) write(r1, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="0700000000000000040000000000"], 0xe) sendfile(r1, r1, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f000002eff0)={0x32b, &(0x7f0000000000)=[{}]}, 0x10) 07:39:31 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="01000000000000003d000100068000"], 0xf}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000000440), 0x400000000000294, 0x0) 07:39:31 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team_slave_0\x00', 0x1000}) r2 = socket$inet6(0xa, 0x800, 0x20) ioctl(r0, 0x8910, &(0x7f0000000080)="15") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002cc0)='./cgroup.net/syz1\'\xde\x96\xd4\x86z>I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="01000000000000003d000100068000"], 0xf}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000000440), 0x400000000000294, 0x0) 07:39:32 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team_slave_0\x00', 0x1000}) r2 = socket$inet6(0xa, 0x800, 0x20) ioctl(r0, 0x8910, &(0x7f0000000080)="15") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002cc0)='./cgroup.net/syz1\'\xde\x96\xd4\x86z>I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="01000000000000003d000100068000"], 0xf}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000000440), 0x400000000000294, 0x0) 07:39:33 executing program 2: 07:39:33 executing program 1: 07:39:33 executing program 5: 07:39:33 executing program 3: 07:39:33 executing program 1: 07:39:33 executing program 2: 07:39:33 executing program 3: 07:39:33 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team_slave_0\x00', 0x1000}) r2 = socket$inet6(0xa, 0x800, 0x20) ioctl(r0, 0x8910, &(0x7f0000000080)="15") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002cc0)='./cgroup.net/syz1\'\xde\x96\xd4\x86z>I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="01000000000000003d00010006800007"], 0x10}}], 0x1, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000440), 0x400000000000294, 0x0) 07:39:33 executing program 2: 07:39:33 executing program 3: 07:39:33 executing program 1: 07:39:33 executing program 5: 07:39:33 executing program 3: 07:39:33 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="01000000000000003d00010006800007"], 0x10}}], 0x1, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000440), 0x400000000000294, 0x0) 07:39:33 executing program 2: 07:39:33 executing program 1: 07:39:33 executing program 5: 07:39:33 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team_slave_0\x00', 0x1000}) r2 = socket$inet6(0xa, 0x800, 0x20) ioctl(r0, 0x8910, &(0x7f0000000080)="15") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002cc0)='./cgroup.net/syz1\'\xde\x96\xd4\x86z>I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="01000000000000003d00010006800007"], 0x10}}], 0x1, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000440), 0x400000000000294, 0x0) 07:39:34 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, &(0x7f0000000300)) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) sendto$inet(r0, 0x0, 0x2ba, 0x400200007fe, &(0x7f00000000c0)={0x2, 0x4004e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) sendmsg$inet_sctp(r0, &(0x7f0000000180)={&(0x7f0000000100)=@in6={0xa, 0x4e22, 0x0, @empty, 0x3}, 0x1c, &(0x7f0000000140)=[{&(0x7f0000000280)="e3c43d394bbf647ffe29ef4b6b9390d91ce6e772f7", 0x15}], 0x1, 0x0, 0x0, 0x4000800}, 0x4000001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff012}], 0x1, &(0x7f0000000200)=""/20, 0xd57}, 0x300) 07:39:34 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, &(0x7f0000000300)) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) ioctl$VIDIOC_SUBDEV_S_CROP(0xffffffffffffffff, 0xc038563c, 0x0) sendto$inet(r0, 0x0, 0x2ba, 0x400200007fe, &(0x7f00000000c0)={0x2, 0x4004e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000600)=@vsock, 0x80) sendmsg$inet_sctp(r0, &(0x7f0000000180)={&(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x4000800}, 0x4000001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff012}], 0x1, &(0x7f0000000200)=""/20, 0xd57}, 0x300) 07:39:34 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000100)={'syz1\x00', {0x800}, 0x0, [0x0, 0x6, 0x0, 0x8, 0x6cb, 0xffff, 0x0, 0xffffffffffffffff, 0xfff, 0x1ff, 0x1f, 0x2, 0x0, 0x46d, 0x3, 0x6, 0x0, 0x10000, 0xff, 0x0, 0x800, 0xde3b, 0xfff, 0x8, 0x10000, 0x66d3, 0xb9c3, 0x8, 0x100, 0x7f, 0x0, 0xa382, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x5, 0x0, 0x0, 0x0, 0x100, 0x39a, 0x0, 0x1, 0x0, 0x0, 0x4, 0x0, 0x71, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x5, 0x0, 0x0, 0x0, 0xa23], [0x0, 0x81, 0xffff, 0x1, 0x7f, 0x7f, 0x3, 0x40, 0x4, 0x0, 0x0, 0x7f4, 0x0, 0x10001, 0xa7, 0x1, 0xdb, 0x800, 0x7fffffff, 0x0, 0x1, 0xf5, 0x20, 0xcd, 0x0, 0x9, 0x0, 0x2, 0xff, 0x9, 0x2, 0x0, 0x0, 0x64, 0x0, 0x0, 0x3, 0xfffffffffffffffe, 0x0, 0x0, 0x6, 0x0, 0x0, 0x4, 0x3, 0x0, 0x0, 0x0, 0x81, 0x5e39, 0x0, 0xf8e, 0x3, 0x80, 0x0, 0x2, 0x123c, 0x0, 0x0, 0x0, 0x40, 0x6, 0x6, 0x7], [0xfffffffffffffffe, 0x0, 0x2b07ed94, 0x3, 0x984, 0x9, 0x7, 0x0, 0xffffffffffff8001, 0x4, 0x3, 0x1, 0x8, 0x401, 0x3, 0x0, 0xbc53, 0x9, 0x0, 0x6, 0x4, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x3, 0x0, 0x0, 0xfffffffffffffffd, 0x9, 0x51b, 0x0, 0xa93f, 0x1, 0x0, 0x80, 0x0, 0x0, 0x3, 0x0, 0xffffffff, 0x0, 0x2, 0x0, 0x81, 0x7, 0x0, 0x9, 0x0, 0x116, 0x3f, 0x4, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x7, 0xbf9, 0x3ff, 0xff8000000, 0x0, 0x408000000000000], [0x8cf8, 0x8, 0x0, 0x7ae, 0x0, 0x100000000, 0x0, 0x3ff, 0x0, 0x0, 0x3, 0xfffffffffffff001, 0xfff, 0x0, 0x0, 0xff, 0x0, 0x0, 0x1, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x9, 0x0, 0x6, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xffff, 0xd927, 0x0, 0x8, 0xc48, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x23, 0x0, 0x400, 0x0, 0x0, 0x0, 0xa164, 0x7ff, 0x0, 0x1, 0x0, 0x7, 0x8, 0x6, 0x0, 0x0, 0x6, 0x0, 0x7]}, 0x45c) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x400000000000) [ 845.349967][T12694] EXT4-fs warning (device sda1): ext4_group_extend:1768: can't shrink FS - resize aborted 07:39:34 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="01000000000000003d00010006800007"], 0x10}}], 0x1, 0x0) sendmmsg(r0, 0x0, 0x0, 0x0) 07:39:34 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000340)=0x2) socket(0x0, 0x0, 0x0) 07:39:34 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team_slave_0\x00', 0x1000}) r2 = socket$inet6(0xa, 0x800, 0x20) ioctl(r0, 0x8910, &(0x7f0000000080)="15") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002cc0)='./cgroup.net/syz1\'\xde\x96\xd4\x86z>I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="01000000000000003d00010006800007"], 0x10}}], 0x1, 0x0) sendmmsg(r0, 0x0, 0x0, 0x0) [ 845.752682][T12716] EXT4-fs warning (device sda1): ext4_group_extend:1768: can't shrink FS - resize aborted 07:39:34 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000000380)=[{0x0}], 0x1, 0x0) r0 = syz_open_dev$usbmon(0x0, 0x81, 0x40000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000800)=ANY=[@ANYBLOB="670000000d755b5b44aa57abc085038d5729f1dc061103ab7806e5011d0ce3fb053d44881409967dc2b989168a1347209ae034a1d38791443092f685de40621e9432d9af68ad04525e17504c17cd0a86a1504361460cbeaad6125e88e0321771ea05107d731e68519a57bb09e704019386d70928bbe886d0f40dcfc861d31f2aad92abf88897618aab7353f4e270f526d1550051a765e672a9dd7d5701b80b55f784d5d3152d508c3ac928d3632bd8d7c6ae3caeacdf9b0c696944c2d1a43cdfb68f86d30436cad852b3"], 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, 0x0, &(0x7f00000006c0)) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0xff, 0x20001) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) write$binfmt_misc(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="000000008e9464a206bd25e188bc0994ddc3d9575e6dec2aa5588b8bff2e1c2222551fbc604e3e3b37d33db65ff8d115168aaccef4eeb7e1eb24c5700ebdff10ece5ca1f61e06965b298c8ce3dd02c68a147a8ec7063e732be04fec951f934879ed74cfde53d9a4f0dd315fd4b8b8ca68aa7d1b08841e555727e8c767ee245828827867edc7a1153576dd34779fce9ab868692959ceba04e576d3c530d6671d7f1e3a0389707d71c3366af65da074ad23cade2cecfaf942b0b4dd95b532479a7c2c73146d1e82cb0b679aa2aafadc8ff4162836a56718e77701ac5fdce60d3eb"], 0xe0) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000500)=""/248) io_submit(0x0, 0x0, &(0x7f0000001540)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:39:34 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team_slave_0\x00', 0x1000}) r2 = socket$inet6(0xa, 0x800, 0x20) ioctl(r0, 0x8910, &(0x7f0000000080)="15") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002cc0)='./cgroup.net/syz1\'\xde\x96\xd4\x86z>I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="01000000000000003d00010006800007"], 0x10}}], 0x1, 0x0) sendmmsg(r0, 0x0, 0x0, 0x0) 07:39:35 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, &(0x7f0000000300)) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) sendto$inet(r0, 0x0, 0x2ba, 0x400200007fe, &(0x7f00000000c0)={0x2, 0x4004e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) sendmsg$inet_sctp(r0, &(0x7f0000000180)={&(0x7f0000000100)=@in6={0xa, 0x4e22, 0x0, @empty, 0x3}, 0x1c, &(0x7f0000000140)=[{&(0x7f0000000280)="e3c43d394bbf647ffe29ef4b6b9390d91ce6e772f7", 0x15}], 0x1, 0x0, 0x0, 0x4000800}, 0x4000001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff012}], 0x1, &(0x7f0000000200)=""/20, 0xd57}, 0x300) 07:39:35 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, &(0x7f0000000300)) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) ioctl$VIDIOC_SUBDEV_S_CROP(0xffffffffffffffff, 0xc038563c, 0x0) sendto$inet(r0, 0x0, 0x2ba, 0x400200007fe, &(0x7f00000000c0)={0x2, 0x4004e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000600)=@vsock, 0x80) sendmsg$inet_sctp(r0, &(0x7f0000000180)={&(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x4000800}, 0x4000001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff012}], 0x1, &(0x7f0000000200)=""/20, 0xd57}, 0x300) 07:39:35 executing program 3: ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, &(0x7f0000000300)) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) sendto$inet(r0, 0x0, 0x2ba, 0x400200007fe, &(0x7f00000000c0)={0x2, 0x4004e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, 0x0, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000180)={&(0x7f0000000100)=@in6={0xa, 0x4e22, 0x0, @empty}, 0x1c, &(0x7f0000000140)=[{&(0x7f0000000280)}], 0x1, 0x0, 0x0, 0x4000800}, 0x4000001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff012}], 0x1, &(0x7f0000000200)=""/20, 0xd57}, 0x300) 07:39:35 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') read$FUSE(r0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) recvmsg(r1, &(0x7f0000000400)={&(0x7f0000000000)=@alg, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000100)=""/202, 0xca}, {&(0x7f0000000200)=""/163, 0xa3}], 0x2, &(0x7f0000000300)=""/231, 0xe7}, 0x42) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x40247007, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) rename(&(0x7f0000000640)='./file0\x00', &(0x7f0000000a40)='./file0\x00') pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000680)='./file0\x00') 07:39:35 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team_slave_0\x00', 0x1000}) r2 = socket$inet6(0xa, 0x800, 0x20) ioctl(r0, 0x8910, &(0x7f0000000080)="15") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002cc0)='./cgroup.net/syz1\'\xde\x96\xd4\x86z>I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-0xffffffffffffffff}) write(r2, &(0x7f0000000000), 0x43578cf5) ptrace(0x4206, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") wait4(0x0, 0x0, 0x0, 0x0) tkill(r1, 0x9) [ 855.448611][T13682] vivid-002: RDS Tx I/O Mode: Controls [ 855.484998][T13682] vivid-002: RDS Program ID: 32904 [ 855.495094][T13682] vivid-002: RDS Program Type: 3 [ 855.508384][T13682] vivid-002: RDS PS Name: VIVID-TX [ 855.516194][T13682] vivid-002: RDS Radio Text: This is a VIVID default Radio Text template text, change at will [ 855.527103][T13682] vivid-002: RDS Stereo: true [ 855.532586][T13682] vivid-002: RDS Artificial Head: false [ 855.538355][T13682] vivid-002: RDS Compressed: false 07:39:44 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team_slave_0\x00', 0x1000}) r2 = socket$inet6(0xa, 0x800, 0x20) ioctl(r0, 0x8910, &(0x7f0000000080)="15") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002cc0)='./cgroup.net/syz1\'\xde\x96\xd4\x86z>I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x20000000010005, 0x2) [ 855.589303][T13682] vivid-002: RDS Dynamic PTY: false [ 855.602571][T13682] vivid-002: RDS Traffic Announcement: false [ 855.625266][T13682] vivid-002: RDS Traffic Program: true [ 855.664794][T13682] vivid-002: RDS Music: true [ 855.681058][T13682] vivid-002: ================== END STATUS ================== 07:39:44 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$VIDIOC_LOG_STATUS(r0, 0x5646, 0x0) 07:39:44 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x2002fffffffe}, 0xc) perf_event_open(&(0x7f0000000040)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$netlink(r0, 0x10e, 0x9, &(0x7f0000000000)=""/75, &(0x7f0000000100)=0x4b) [ 855.872272][T13810] vivid-002: ================= START STATUS ================= [ 855.894710][T13810] vivid-002: RDS Tx I/O Mode: Controls [ 855.910954][T13810] vivid-002: RDS Program ID: 32904 07:39:44 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000001000)={{0x100000001}}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x2}}) 07:39:44 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team_slave_0\x00', 0x1000}) r2 = socket$inet6(0xa, 0x800, 0x20) ioctl(r0, 0x8910, &(0x7f0000000080)="15") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002cc0)='./cgroup.net/syz1\'\xde\x96\xd4\x86z>I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) socket$inet6_dccp(0xa, 0x6, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000002140)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_G_STD(0xffffffffffffffff, 0x80085617, 0x0) [ 861.549968][T14585] kvm [14582]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x4000007f data 0x4d00000000f [ 861.612467][T14585] kvm [14582]: vcpu0, guest rIP: 0x8a Hyper-V uhandled wrmsr: 0x4000004d data 0x4d00000000f [ 861.655317][T14808] vivid-002: ================= START STATUS ================= [ 861.699500][T14808] vivid-002: RDS Tx I/O Mode: Controls [ 861.719346][T14808] vivid-002: RDS Program ID: 32904 [ 861.739258][T14808] vivid-002: RDS Program Type: 3 [ 861.760236][T14808] vivid-002: RDS PS Name: VIVID-TX [ 861.779709][T14808] vivid-002: RDS Radio Text: This is a VIVID default Radio Text template text, change at will [ 861.826416][T14808] vivid-002: RDS Stereo: true [ 861.901640][T14808] vivid-002: RDS Artificial Head: false [ 861.912994][T14808] vivid-002: RDS Compressed: false [ 861.952783][T14808] vivid-002: RDS Dynamic PTY: false [ 861.979354][T14808] vivid-002: RDS Traffic Announcement: false [ 862.001709][T14808] vivid-002: RDS Traffic Program: true [ 862.020668][T14808] vivid-002: RDS Music: true 07:39:50 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f0000000240)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) 07:39:50 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team_slave_0\x00', 0x1000}) r2 = socket$inet6(0xa, 0x800, 0x20) ioctl(r0, 0x8910, &(0x7f0000000080)="15") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002cc0)='./cgroup.net/syz1\'\xde\x96\xd4\x86z>I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-0xffffffffffffffff}) write(r2, &(0x7f0000000000), 0x43578cf5) ptrace(0x4206, r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") tkill(r1, 0x9) 07:39:51 executing program 2: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='.\x00\x00\x00\x00\x00\x00\x00\x01cpCcrE\a_\xc5g\xb3I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-\xe4\f\r&`\xd8\x13\x91\xecy\xed\xfa.\xe4\xbe`\x03P\x14;[5\x1e\xd5\xd8A\x15A\x8aG\t\x12\x8d\x00\xaf\xc4\xd6\v,\xbf\x886\xbb\t\x06\x1feR\x9d\xaf\xd3?\x104z>\xda{\xc9\xe3\x91\xf6\xe2\xe8T\xaa\x9a:\xf8>y\xb1\xc8\x93y\xe5OQ|\xe0\xcf\x15\x00\xc2\an\xe9~/\xcf\x98\xbcCupFJ\x90\x1f!\xba\xd0\xad\x8bp`\v\x0e\x1f\xd6!\xba\x95$\x1b\n\xbazUR\x8e\xb4|RH\xcb\xf7T\xef\x94\xb3\xe0\xeb\"\x92\x0fy\x84\xf1\x8b0\xfeiE\xdbl9\xc6s\xd61\xc6}\xc3\xa8\xc4\xb71\x95\xe0\x9c\x8dO\x88f\xc7L+\x0e\x9f\xb7\x10\x13\x82\xe2\b\xd5\xd7\x01\'\x9b\xb4\x9d\xf3\xa1Qj<\xf4\x03*\xc2\'\xd9\x17VQ>\xd4Z\xffVV\xf3d\x12@\x0f\xaa\t\x11\x19\x8c=\xd1\x1e|\x8b.\xcd\xcc\xc5\x17\xcd\xd6\xda\x82;\x00\xdd\x97\x9a\xd0\xbd\xdb\v>w\xbc\x90\x90a\xf6\xbf\x02\xefdd1$\x8d\xf0\xbe\xdcdl\xb4\xe1\x9azuM\x9d\xf0\xec\xee\xe4\x9b\xf0b\xbe\x13\x01@\xaeu1\x0eJ~\xad\x85\xf3\x9f.p\x05Z\x84\xdd\xe0\x89\x85\x93\xf0\x9c\xcb\x13WM\xd5\x80\xbc \x13\xa0\xc7F[\xfaQQ\xc8YQw4\\A8\xfdw\x9d;\xcb\xf9\xe6\xa5\"\xe7f#+\xe3\bJM\x85e\xc1\xfbvk\xdc\x06\x81\xbb0n\xe4L\xd2\xe1\xe2\xe5\x04v\x90\x991\x04KF\x93\x17\x1f\x13\x0f\xb5?E ', 0x0) pwritev(r1, &(0x7f0000000000)=[{&(0x7f0000000440)="16", 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) 07:39:51 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) sendto$inet(r0, 0x0, 0x2ba, 0x400200007fe, &(0x7f00000000c0)={0x2, 0x4004e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff012}], 0x1, &(0x7f0000000200)=""/20, 0xd57}, 0x300) [ 862.733748][T14938] vivid-002: RDS Dynamic PTY: false [ 862.767427][T14938] vivid-002: RDS Traffic Announcement: false [ 862.812321][T14938] vivid-002: RDS Traffic Program: true [ 862.818098][T14938] vivid-002: RDS Music: true 07:39:51 executing program 2: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='.\x00\x00\x00\x00\x00\x00\x00\x01cpCcrE\a_\xc5g\xb3I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-0x0) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000500)=""/248) io_submit(r4, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r2, &(0x7f0000000000), 0xfffffce4}]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 07:39:52 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team_slave_0\x00', 0x1000}) r2 = socket$inet6(0xa, 0x800, 0x20) ioctl(r0, 0x8910, &(0x7f0000000080)="15") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002cc0)='./cgroup.net/syz1\'\xde\x96\xd4\x86z>I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-0x0) io_getevents(r0, 0x3, 0x3, &(0x7f00000000c0)=[{}, {}, {}], 0x0) [ 871.875999][T16505] vivid-002: ================== END STATUS ================== 07:40:00 executing program 1: ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) syz_open_dev$dmmidi(&(0x7f00000002c0)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_CROP(r0, 0xc038563c, &(0x7f0000000700)={0x1, 0x0, {0x0, 0x100000001}}) sendto$inet(r0, 0x0, 0x2ba, 0x400200007fe, &(0x7f00000000c0)={0x2, 0x4004e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000600)=@vsock={0x28, 0x0, 0x2711}, 0x80) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, 0x0, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000180)={&(0x7f0000000100)=@in6={0xa, 0x4e22, 0x0, @empty, 0x3}, 0x1c, &(0x7f0000000140)=[{&(0x7f0000000280)="e3c43d394bbf647ffe29ef4b6b9390d91c", 0x11}], 0x1, 0x0, 0x0, 0x4000800}, 0x4000001) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff012}], 0x1, &(0x7f0000000200)=""/20, 0xd57}, 0x300) 07:40:00 executing program 2: r0 = getpid() getpriority(0x0, r0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r2, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='.\x00\x00\x00\x00\x00\x00\x00\x01cpCcrE\a_\xc5g\xb3I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-I_B\xd2\xad\x1b\x0fY\x82\xd2\xafI\xd40\xc9\b!E|\xa9\x15\xe1\xbdW\xe4\xb5\xfc\xbd\xe7\xe2\xb0R\x9a\xfdp\xc6s\xf0\x04\xce=r\xeb+\xd1c\xe5\xe8\x13~\xf4\x93\x8eg\xeb}^\xfe\'\xa6T\xd2\xf7)\x98v\x9b\x19W\x9c\xd6\xe0\x94\xc5xs+C\xefE\xd4!\xef\xe2%_\xf6\xccx\xe2iqo,\x86?\x85\xfb\xb4!`@9N\x11\t\xe7\xf7wO,V\xc9\xaf_E3\xc43\xb1NX\x91,\x18\xdf\xad\xb1YB*?\xd5]P\xce\xdfL\x18\xe5\xfc\xd2#i>\xc5\x04\xd2|\x01Spp\x96PL\xd5)\xd3\x0ex\x93\xa1\x85\xd37\xad\x10\x04\xde\a[\xcc\xbd\x83u\x90\xc3\xb5\x9a$A\x159\x05<\x98K\x04\xa68\x8c\xdfa\x03\xfae2\xf2\x81\x84}\x8a\xacM\x10\xe0\x7fs N\x01eRU\xc1\xc5\xbf\x13\x14\x10\xff\x1d\xa9\xf0=\xeb\x109l\x91\x13\xd9\'\xb3\x0e\xf2\xb4\xae\xdbR\xd4L\xa5\xe6\xa1+\x9a\xbd\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xdf\x9c\xbaU\x84\xc8v,\x1e\x916\xbf\x83\xa6\x91K<\xab\xbe\r\x80\xabQ\xc5n|b\xbbJ\xf9\x85z\xa2B\x16i\xb7\\ j2%@[\x87\xaa^-s_type->i_mutex_key#10){++++}, at: process_measurement+0x15ae/0x15e0 [ 876.684508][T16829] [ 876.684508][T16829] but task is already holding lock: [ 876.684511][T16829] 000000009276a5b7 (&mm->mmap_sem#2){++++}, at: do_mprotect_pkey+0x1f6/0xa30 [ 876.684534][T16829] [ 876.684534][T16829] which lock already depends on the new lock. [ 876.684534][T16829] [ 876.684537][T16829] [ 876.684537][T16829] the existing dependency chain (in reverse order) is: [ 876.684541][T16829] [ 876.684541][T16829] -> #1 (&mm->mmap_sem#2){++++}: [ 876.684572][T16829] down_read+0x3f/0x1e0 [ 876.684584][T16829] get_user_pages_unlocked+0xfc/0x4a0 [ 876.684596][T16829] get_user_pages_fast+0x43f/0x530 [ 876.684620][T16829] iov_iter_get_pages+0x2c2/0xf80 [ 876.740240][ T3881] kobject: 'loop0' (00000000a590645f): kobject_uevent_env [ 876.746192][T16829] do_blockdev_direct_IO+0x3f7b/0x8e00 [ 876.746203][T16829] __blockdev_direct_IO+0xa1/0xca [ 876.746216][T16829] ext4_direct_IO+0xaa7/0x1bb0 [ 876.746243][T16829] generic_file_direct_write+0x20a/0x4a0 [ 876.779498][ T3881] kobject: 'loop0' (00000000a590645f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 876.779669][T16829] __generic_file_write_iter+0x2ee/0x630 [ 876.831849][T16829] ext4_file_write_iter+0x332/0x1070 [ 876.837666][T16829] new_sync_write+0x4d3/0x770 [ 876.842889][T16829] __vfs_write+0xe1/0x110 [ 876.842969][ T3881] kobject: 'loop3' (00000000ec7bfb30): kobject_uevent_env [ 876.847837][T16829] vfs_write+0x268/0x5d0 [ 876.860371][T16829] ksys_write+0x14f/0x290 [ 876.865232][T16829] __x64_sys_write+0x73/0xb0 [ 876.870351][T16829] do_syscall_64+0xfd/0x680 [ 876.875383][T16829] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 876.882340][T16829] [ 876.882340][T16829] -> #0 (&sb->s_type->i_mutex_key#10){++++}: [ 876.885806][ T3881] kobject: 'loop3' (00000000ec7bfb30): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 876.890519][T16829] lock_acquire+0x16f/0x3f0 [ 876.890532][T16829] down_write+0x38/0xa0 [ 876.890545][T16829] process_measurement+0x15ae/0x15e0 [ 876.890555][T16829] ima_file_mmap+0x11a/0x130 [ 876.890567][T16829] security_file_mprotect+0xd5/0x100 [ 876.890578][T16829] do_mprotect_pkey+0x537/0xa30 [ 876.890588][T16829] __x64_sys_mprotect+0x78/0xb0 [ 876.890601][T16829] do_syscall_64+0xfd/0x680 [ 876.890622][T16829] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 876.906668][T16834] kobject: 'input13' (00000000dc34647e): kobject_cleanup, parent 0000000030e1f032 [ 876.910963][T16829] [ 876.910963][T16829] other info that might help us debug this: [ 876.910963][T16829] [ 876.910968][T16829] Possible unsafe locking scenario: [ 876.910968][T16829] [ 876.910970][T16829] CPU0 CPU1 [ 876.910973][T16829] ---- ---- [ 876.910975][T16829] lock(&mm->mmap_sem#2); [ 876.910988][T16829] lock(&sb->s_type->i_mutex_key#10); [ 876.910997][T16829] lock(&mm->mmap_sem#2); [ 876.911005][T16829] lock(&sb->s_type->i_mutex_key#10); [ 876.911014][T16829] [ 876.911014][T16829] *** DEADLOCK *** [ 876.911014][T16829] [ 876.911021][T16829] 1 lock held by syz-executor.5/16829: [ 876.911024][T16829] #0: 000000009276a5b7 (&mm->mmap_sem#2){++++}, at: do_mprotect_pkey+0x1f6/0xa30 [ 876.911053][T16829] [ 876.911053][T16829] stack backtrace: [ 876.911066][T16829] CPU: 1 PID: 16829 Comm: syz-executor.5 Not tainted 5.2.0-rc3-next-20190604 #8 07:40:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_LOG_STATUS(0xffffffffffffffff, 0x5646, 0x0) [ 876.911072][T16829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 876.911077][T16829] Call Trace: [ 876.911150][T16829] dump_stack+0x172/0x1f0 [ 876.917885][T16834] kobject: 'input13' (00000000dc34647e): calling ktype release [ 876.922109][T16829] print_circular_bug.cold+0x1cc/0x28f [ 876.922124][T16829] __lock_acquire+0x3755/0x5490 [ 876.922140][T16829] ? ima_match_policy+0x9e9/0x13b0 [ 876.922155][T16829] ? mark_held_locks+0xf0/0xf0 [ 876.922169][T16829] ? ima_match_policy+0xa10/0x13b0 [ 876.922185][T16829] lock_acquire+0x16f/0x3f0 [ 876.922199][T16829] ? process_measurement+0x15ae/0x15e0 [ 876.922220][T16829] down_write+0x38/0xa0 [ 876.929993][T16834] kobject: 'input13': free name [ 876.933394][T16829] ? process_measurement+0x15ae/0x15e0 [ 876.933409][T16829] process_measurement+0x15ae/0x15e0 [ 876.933428][T16829] ? aa_file_perm+0x40b/0xeb0 [ 876.977070][ T3881] kobject: 'loop0' (00000000a590645f): kobject_uevent_env [ 876.977486][T16829] ? mmap_violation_check+0x200/0x200 [ 876.987585][ T3881] kobject: 'loop0' (00000000a590645f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 876.988209][T16829] ? mark_held_locks+0xf0/0xf0 [ 877.107510][ T3881] kobject: 'loop3' (00000000ec7bfb30): kobject_uevent_env [ 877.107622][T16829] ? lock_downgrade+0x880/0x880 [ 877.114479][ T3881] kobject: 'loop3' (00000000ec7bfb30): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 877.117397][T16829] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 877.117419][T16829] ? kasan_check_read+0x11/0x20 [ 877.200177][T16829] ? aa_get_task_label+0x3a6/0x720 [ 877.205620][T16829] ? find_held_lock+0x35/0x130 [ 877.210492][T16829] ? aa_get_task_label+0x3a6/0x720 [ 877.215616][T16829] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 877.222032][T16829] ? refcount_sub_and_test_checked+0x154/0x200 [ 877.228634][T16829] ? refcount_dec_not_one+0x1f0/0x1f0 [ 877.234003][T16829] ? refcount_dec_and_test_checked+0x1b/0x20 [ 877.239999][T16829] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 877.246237][T16829] ? apparmor_task_getsecid+0x94/0xd0 [ 877.251604][T16829] ima_file_mmap+0x11a/0x130 [ 877.256184][T16829] ? ima_file_free+0x4a0/0x4a0 [ 877.260938][T16829] security_file_mprotect+0xd5/0x100 [ 877.266300][T16829] do_mprotect_pkey+0x537/0xa30 [ 877.271138][T16829] ? mprotect_fixup+0xa70/0xa70 [ 877.275978][T16829] ? do_syscall_64+0x26/0x680 [ 877.281000][T16829] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 877.287326][T16829] ? do_syscall_64+0x26/0x680 [ 877.292176][T16829] __x64_sys_mprotect+0x78/0xb0 [ 877.297782][T16829] do_syscall_64+0xfd/0x680 [ 877.302320][T16829] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 877.308222][T16829] RIP: 0033:0x459279 [ 877.312105][T16829] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 877.331692][T16829] RSP: 002b:00007fdf5d77fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 877.340091][T16829] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459279 [ 877.348048][T16829] RDX: 0000000000000006 RSI: 0000000000800000 RDI: 0000000020000000 07:40:06 executing program 1: ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) syz_open_dev$dmmidi(&(0x7f00000002c0)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_CROP(r0, 0xc038563c, &(0x7f0000000700)={0x1, 0x0, {0x0, 0x100000001}}) sendto$inet(r0, 0x0, 0x2ba, 0x400200007fe, &(0x7f00000000c0)={0x2, 0x4004e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000600)=@vsock={0x28, 0x0, 0x2711}, 0x80) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff012}], 0x1, &(0x7f0000000200)=""/20, 0xd57}, 0x300) [ 877.356006][T16829] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 877.363963][T16829] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdf5d7806d4 [ 877.371938][T16829] R13: 00000000004c5d11 R14: 00000000004d9670 R15: 00000000ffffffff [ 877.387429][ T3881] kobject: 'loop2' (000000005137f545): kobject_uevent_env [ 877.397105][ T3881] kobject: 'loop2' (000000005137f545): fill_kobj_path: path = '/devices/virtual/block/loop2' 07:40:06 executing program 4: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f0000000180)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x4, 0x0, [{}, {}, {0x0, 0x0, 0x0, [], 0x7fff}]}}) 07:40:06 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c1, 0x0) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x10000) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) lgetxattr(0x0, 0x0, &(0x7f00000000c0)=""/51, 0x33) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/current\x00', 0x2, 0x0) 07:40:06 executing program 3: clone(0x200000041fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setsig(0x4203, r0, 0x0, 0x0) 07:40:06 executing program 2: r0 = getpid() getpriority(0x0, r0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bind$packet(r1, &(0x7f0000006e40)={0x11, 0xf}, 0x14) 07:40:06 executing program 5: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x10000) setsockopt$inet6_int(r1, 0x29, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, 0x0, 0x0) rt_sigqueueinfo(0x0, 0x0, 0x0) [ 877.463630][ T3881] kobject: 'loop1' (00000000793c7074): kobject_uevent_env [ 877.470821][ T3881] kobject: 'loop1' (00000000793c7074): fill_kobj_path: path = '/devices/virtual/block/loop1' 07:40:06 executing program 4: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f0000000180)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x4, 0x0, [{}, {}, {0x0, 0x0, 0x0, [], 0x7fff}]}}) [ 877.501231][ T26] audit: type=1800 audit(1559634006.073:60): pid=16856 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=18389 res=0 07:40:06 executing program 2: r0 = getpid() getpriority(0x0, r0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') bind$packet(r1, &(0x7f0000006e40)={0x11, 0xf}, 0x14) [ 877.558996][ T26] audit: type=1804 audit(1559634006.113:61): pid=16856 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="file0" dev="sda1" ino=18389 res=1 [ 877.580426][ T3881] kobject: 'loop4' (000000000804b333): kobject_uevent_env [ 877.599180][ T3881] kobject: 'loop4' (000000000804b333): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 877.623969][ T3881] kobject: 'loop2' (000000005137f545): kobject_uevent_env [ 877.632504][ T26] audit: type=1804 audit(1559634006.113:62): pid=16859 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir713315730/syzkaller.V7Z48T/1173/file0" dev="sda1" ino=18393 res=1 07:40:06 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c1, 0x0) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x10000) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) lgetxattr(0x0, 0x0, &(0x7f00000000c0)=""/51, 0x33) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/current\x00', 0x2, 0x0) 07:40:06 executing program 2: r0 = getpid() getpriority(0x0, r0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') bind$packet(r1, &(0x7f0000006e40)={0x11, 0xf}, 0x14) [ 877.676815][ T3881] kobject: 'loop2' (000000005137f545): fill_kobj_path: path = '/devices/virtual/block/loop2' 07:40:06 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x4, 0x0, [{}, {}, {0x0, 0x0, 0x0, [], 0x7fff}]}}) [ 877.749600][ T26] audit: type=1804 audit(1559634006.113:63): pid=16853 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir713315730/syzkaller.V7Z48T/1173/file0" dev="sda1" ino=18393 res=1 [ 877.775274][ T3881] kobject: 'loop0' (00000000a590645f): kobject_uevent_env [ 877.788401][ T3881] kobject: 'loop0' (00000000a590645f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 877.833957][ T3881] kobject: 'loop4' (000000000804b333): kobject_uevent_env [ 877.841566][ T3881] kobject: 'loop4' (000000000804b333): fill_kobj_path: path = '/devices/virtual/block/loop4' 07:40:06 executing program 2: r0 = getpid() getpriority(0x0, r0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') unlink(&(0x7f0000000600)='./file0\x00') bind$packet(r1, &(0x7f0000006e40)={0x11, 0xf}, 0x14) [ 877.906513][ T26] audit: type=1800 audit(1559634006.470:64): pid=16856 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file0" dev="sda1" ino=18389 res=0 [ 877.937218][ T3881] kobject: 'loop2' (000000005137f545): kobject_uevent_env [ 877.958217][ T26] audit: type=1804 audit(1559634006.480:65): pid=16876 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir713315730/syzkaller.V7Z48T/1174/file0" dev="sda1" ino=18393 res=1 [ 877.993572][ T3881] kobject: 'loop2' (000000005137f545): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 878.056435][ T3881] kobject: 'loop2' (000000005137f545): kobject_uevent_env [ 878.064033][ T3881] kobject: 'loop2' (000000005137f545): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 878.207190][ T3881] kobject: 'loop0' (00000000a590645f): kobject_uevent_env [ 878.214797][ T3881] kobject: 'loop0' (00000000a590645f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 878.275030][ T3881] kobject: 'loop3' (00000000ec7bfb30): kobject_uevent_env [ 878.283000][ T3881] kobject: 'loop3' (00000000ec7bfb30): fill_kobj_path: path = '/devices/virtual/block/loop3' 07:40:06 executing program 1: ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) syz_open_dev$dmmidi(&(0x7f00000002c0)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_CROP(r0, 0xc038563c, &(0x7f0000000700)={0x1, 0x0, {0x0, 0x100000001}}) sendto$inet(r0, 0x0, 0x2ba, 0x400200007fe, &(0x7f00000000c0)={0x2, 0x4004e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000600)=@vsock={0x28, 0x0, 0x2711}, 0x80) sendmsg$inet_sctp(r0, &(0x7f0000000180)={&(0x7f0000000100)=@in6={0xa, 0x4e22, 0x0, @empty, 0x3}, 0x1c, &(0x7f0000000140)=[{&(0x7f0000000280)="e3c43d394bbf647ffe29ef4b6b9390d91c", 0x11}], 0x1, 0x0, 0x0, 0x4000800}, 0x4000001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff012}], 0x1, &(0x7f0000000200)=""/20, 0xd57}, 0x300) 07:40:06 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x4, 0x0, [{}, {}, {0x0, 0x0, 0x0, [], 0x7fff}]}}) 07:40:06 executing program 5: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x10000) setsockopt$inet6_int(r1, 0x29, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, 0x0, 0x0) rt_sigqueueinfo(0x0, 0x0, 0x0) 07:40:06 executing program 2: r0 = getpid() getpriority(0x0, r0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bind$packet(r1, &(0x7f0000006e40)={0x11, 0xf}, 0x14) 07:40:06 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c1, 0x0) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x10000) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) lgetxattr(0x0, 0x0, &(0x7f00000000c0)=""/51, 0x33) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/current\x00', 0x2, 0x0) 07:40:06 executing program 3: clone(0x200000041fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setsig(0x4203, r0, 0x0, 0x0) [ 878.361945][ T3881] kobject: 'loop1' (00000000793c7074): kobject_uevent_env [ 878.398336][ T3881] kobject: 'loop1' (00000000793c7074): fill_kobj_path: path = '/devices/virtual/block/loop1' 07:40:07 executing program 2: r0 = getpid() getpriority(0x0, r0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bind$packet(r1, &(0x7f0000006e40)={0x11, 0xf}, 0x14) 07:40:07 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x4, 0x0, [{}, {}, {0x0, 0x0, 0x0, [], 0x7fff}]}}) [ 878.420895][ T26] audit: type=1800 audit(1559634006.985:66): pid=16899 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=18393 res=0 [ 878.470479][ T3881] kobject: 'loop2' (000000005137f545): kobject_uevent_env [ 878.481200][ T3881] kobject: 'loop2' (000000005137f545): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 878.511935][ T3881] kobject: 'loop4' (000000000804b333): kobject_uevent_env [ 878.525908][ T26] audit: type=1804 audit(1559634007.005:67): pid=16899 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="file0" dev="sda1" ino=18393 res=1 [ 878.530291][ T3881] kobject: 'loop4' (000000000804b333): fill_kobj_path: path = '/devices/virtual/block/loop4' 07:40:07 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f0000000180)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x4, 0x0, [{}, {}, {0x0, 0x0, 0x0, [], 0x7fff}]}}) [ 878.592698][ T26] audit: type=1804 audit(1559634007.084:68): pid=16898 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir713315730/syzkaller.V7Z48T/1175/file0" dev="sda1" ino=18392 res=1 07:40:07 executing program 2: r0 = getpid() getpriority(0x0, r0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bind$packet(r1, &(0x7f0000006e40)={0x11, 0xf}, 0x14) 07:40:07 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f0000000180)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x4, 0x0, [{}, {}, {0x0, 0x0, 0x0, [], 0x7fff}]}}) [ 878.674943][ T3881] kobject: 'loop2' (000000005137f545): kobject_uevent_env [ 878.688816][ T3881] kobject: 'loop2' (000000005137f545): fill_kobj_path: path = '/devices/virtual/block/loop2' 07:40:07 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f0000000180)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x4, 0x0, [{}, {}, {0x0, 0x0, 0x0, [], 0x7fff}]}}) [ 878.732903][ T3881] kobject: 'loop4' (000000000804b333): kobject_uevent_env [ 878.760546][ T3881] kobject: 'loop4' (000000000804b333): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 878.836486][ T3881] kobject: 'loop2' (000000005137f545): kobject_uevent_env [ 878.843942][ T3881] kobject: 'loop2' (000000005137f545): fill_kobj_path: path = '/devices/virtual/block/loop2' 07:40:07 executing program 1: ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) syz_open_dev$dmmidi(&(0x7f00000002c0)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_CROP(r0, 0xc038563c, &(0x7f0000000700)={0x1, 0x0, {0x0, 0x100000001}}) sendto$inet(r0, 0x0, 0x2ba, 0x400200007fe, &(0x7f00000000c0)={0x2, 0x4004e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000600)=@vsock={0x28, 0x0, 0x2711}, 0x80) sendmsg$inet_sctp(r0, &(0x7f0000000180)={&(0x7f0000000100)=@in6={0xa, 0x4e22, 0x0, @empty, 0x3}, 0x1c, &(0x7f0000000140)=[{&(0x7f0000000280)="e3c43d394bbf647ffe29ef4b6b9390d91c", 0x11}], 0x1, 0x0, 0x0, 0x4000800}, 0x4000001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff012}], 0x1, &(0x7f0000000200)=""/20, 0xd57}, 0x300) 07:40:07 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x4, 0x0, [{}, {}, {0x0, 0x0, 0x0, [], 0x7fff}]}}) 07:40:07 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c1, 0x0) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x10000) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) lgetxattr(0x0, 0x0, &(0x7f00000000c0)=""/51, 0x33) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/current\x00', 0x2, 0x0) 07:40:07 executing program 2: r0 = getpid() getpriority(0x0, r0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bind$packet(r1, &(0x7f0000006e40)={0x11, 0xf}, 0x14) 07:40:07 executing program 5: clone(0x200000041fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setsig(0x4203, r0, 0x0, 0x0) [ 878.915087][ T3881] kobject: 'loop0' (00000000a590645f): kobject_uevent_env [ 878.954980][ T3881] kobject: 'loop0' (00000000a590645f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 878.981746][T16932] kobject: 'kvm' (0000000005a4cb69): kobject_uevent_env [ 878.995205][T16932] kobject: 'kvm' (0000000005a4cb69): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 878.998748][ T3881] kobject: 'loop4' (000000000804b333): kobject_uevent_env [ 879.024661][ T3881] kobject: 'loop4' (000000000804b333): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 879.027672][T16925] kobject: 'kvm' (0000000005a4cb69): kobject_uevent_env [ 879.049963][T16925] kobject: 'kvm' (0000000005a4cb69): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 879.051954][ T3881] kobject: 'loop1' (00000000793c7074): kobject_uevent_env [ 879.091145][ T3881] kobject: 'loop1' (00000000793c7074): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 879.101196][ T26] audit: type=1804 audit(1559634007.650:69): pid=16933 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir713315730/syzkaller.V7Z48T/1176/file0" dev="sda1" ino=18387 res=1 [ 879.103342][ T3881] kobject: 'loop2' (000000005137f545): kobject_uevent_env 07:40:07 executing program 3: clone(0x200000041fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setsig(0x4203, r0, 0x0, 0x0) 07:40:07 executing program 2: r0 = getpid() getpriority(0x0, r0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bind$packet(r1, &(0x7f0000006e40)={0x11, 0xf}, 0x14) 07:40:07 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x4, 0x0, [{}, {}, {0x0, 0x0, 0x0, [], 0x7fff}]}}) [ 879.133839][ T3881] kobject: 'loop2' (000000005137f545): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 879.158432][ T3881] kobject: 'loop4' (000000000804b333): kobject_uevent_env [ 879.165642][ T3881] kobject: 'loop4' (000000000804b333): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 879.206128][ T3881] kobject: 'loop3' (00000000ec7bfb30): kobject_uevent_env 07:40:07 executing program 2: r0 = getpid() getpriority(0x0, r0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bind$packet(r1, &(0x7f0000006e40)={0x11, 0xf}, 0x14) [ 879.267376][ T3881] kobject: 'loop3' (00000000ec7bfb30): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 879.322485][ T3881] kobject: 'loop2' (000000005137f545): kobject_uevent_env [ 879.323184][T16947] kobject: 'kvm' (0000000005a4cb69): kobject_uevent_env [ 879.346654][ T3881] kobject: 'loop2' (000000005137f545): fill_kobj_path: path = '/devices/virtual/block/loop2' 07:40:08 executing program 2: r0 = getpid() getpriority(0x0, r0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bind$packet(r1, &(0x7f0000006e40)={0x11, 0xf}, 0x14) 07:40:08 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c1, 0x0) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x10000) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/current\x00', 0x2, 0x0) [ 879.375940][T16947] kobject: 'kvm' (0000000005a4cb69): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 879.444757][ T3881] kobject: 'loop2' (000000005137f545): kobject_uevent_env [ 879.462976][ T3881] kobject: 'loop2' (000000005137f545): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 879.493835][ T3881] kobject: 'loop0' (00000000a590645f): kobject_uevent_env [ 879.505397][ T3881] kobject: 'loop0' (00000000a590645f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 879.527881][T16943] kobject: 'kvm' (0000000005a4cb69): kobject_uevent_env 07:40:08 executing program 2: r0 = getpid() getpriority(0x0, r0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bind$packet(r1, &(0x7f0000006e40)={0x11, 0xf}, 0x14) [ 879.549376][T16943] kobject: 'kvm' (0000000005a4cb69): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 879.566919][ T3881] kobject: 'loop2' (000000005137f545): kobject_uevent_env [ 879.582657][ T3881] kobject: 'loop2' (000000005137f545): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 879.624630][ T3881] kobject: 'loop4' (000000000804b333): kobject_uevent_env [ 879.634497][ T3881] kobject: 'loop4' (000000000804b333): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 879.729946][ T3881] kobject: 'loop0' (00000000a590645f): kobject_uevent_env [ 879.737232][ T3881] kobject: 'loop0' (00000000a590645f): fill_kobj_path: path = '/devices/virtual/block/loop0' 07:40:08 executing program 1: ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) syz_open_dev$dmmidi(&(0x7f00000002c0)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_CROP(r0, 0xc038563c, &(0x7f0000000700)={0x1, 0x0, {0x0, 0x100000001}}) sendto$inet(r0, 0x0, 0x2ba, 0x400200007fe, &(0x7f00000000c0)={0x2, 0x4004e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000600)=@vsock={0x28, 0x0, 0x2711}, 0x80) sendmsg$inet_sctp(r0, &(0x7f0000000180)={&(0x7f0000000100)=@in6={0xa, 0x4e22, 0x0, @empty, 0x3}, 0x1c, &(0x7f0000000140)=[{&(0x7f0000000280)="e3c43d394bbf647ffe29ef4b6b9390d91c", 0x11}], 0x1, 0x0, 0x0, 0x4000800}, 0x4000001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff012}], 0x1, &(0x7f0000000200)=""/20, 0xd57}, 0x300) 07:40:08 executing program 2: r0 = getpid() getpriority(0x0, r0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bind$packet(r1, &(0x7f0000006e40)={0x11, 0xf}, 0x14) 07:40:08 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x4, 0x0, [{}, {}, {0x0, 0x0, 0x0, [], 0x7fff}]}}) 07:40:08 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c1, 0x0) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x10000) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/current\x00', 0x2, 0x0) 07:40:08 executing program 5: clone(0x200000041fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setsig(0x4203, r0, 0x0, 0x0) [ 879.849477][T17069] kobject: 'kvm' (0000000005a4cb69): kobject_uevent_env [ 879.851048][ T3881] kobject: 'loop1' (00000000793c7074): kobject_uevent_env [ 879.877969][ T3881] kobject: 'loop1' (00000000793c7074): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 879.883948][T17069] kobject: 'kvm' (0000000005a4cb69): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 879.930181][ T3881] kobject: 'loop2' (000000005137f545): kobject_uevent_env [ 879.939792][ T3881] kobject: 'loop2' (000000005137f545): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 879.956623][T17068] kobject: 'kvm' (0000000005a4cb69): kobject_uevent_env [ 879.964652][T17068] kobject: 'kvm' (0000000005a4cb69): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 880.014027][ T3881] kobject: 'loop4' (000000000804b333): kobject_uevent_env [ 880.021966][ T3881] kobject: 'loop4' (000000000804b333): fill_kobj_path: path = '/devices/virtual/block/loop4' 07:40:08 executing program 3: clone(0x200000041fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setsig(0x4203, r0, 0x0, 0x0) 07:40:08 executing program 2: r0 = getpid() getpriority(0x0, r0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bind$packet(r1, &(0x7f0000006e40)={0x11, 0xf}, 0x14) 07:40:08 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x4, 0x0, [{}, {}, {0x0, 0x0, 0x0, [], 0x7fff}]}}) [ 880.112865][ T3881] kobject: 'loop3' (00000000ec7bfb30): kobject_uevent_env [ 880.138782][ T3881] kobject: 'loop3' (00000000ec7bfb30): fill_kobj_path: path = '/devices/virtual/block/loop3' 07:40:08 executing program 2: r0 = getpid() getpriority(0x0, r0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bind$packet(r1, &(0x7f0000006e40)={0x11, 0xf}, 0x14) [ 880.170284][T17088] kobject: 'kvm' (0000000005a4cb69): kobject_uevent_env [ 880.180437][T17088] kobject: 'kvm' (0000000005a4cb69): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 880.199901][ T3881] kobject: 'loop2' (000000005137f545): kobject_uevent_env 07:40:08 executing program 2: r0 = getpid() getpriority(0x0, r0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bind$packet(r1, &(0x7f0000006e40)={0x11, 0xf}, 0x14) 07:40:08 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c1, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/current\x00', 0x2, 0x0) [ 880.215909][ T3881] kobject: 'loop2' (000000005137f545): fill_kobj_path: path = '/devices/virtual/block/loop2' 07:40:08 executing program 2: r0 = getpid() getpriority(0x0, r0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000006e40)={0x11, 0xf}, 0x14) [ 880.277893][ T3881] kobject: 'loop2' (000000005137f545): kobject_uevent_env [ 880.285270][ T3881] kobject: 'loop2' (000000005137f545): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 880.305605][ T3881] kobject: 'loop0' (00000000a590645f): kobject_uevent_env [ 880.318897][ T3881] kobject: 'loop0' (00000000a590645f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 880.320214][T17088] kobject: 'kvm' (0000000005a4cb69): kobject_uevent_env [ 880.337537][T17088] kobject: 'kvm' (0000000005a4cb69): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 880.408123][ T3881] kobject: 'loop4' (000000000804b333): kobject_uevent_env [ 880.415397][ T3881] kobject: 'loop4' (000000000804b333): fill_kobj_path: path = '/devices/virtual/block/loop4' 07:40:09 executing program 1: ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) syz_open_dev$dmmidi(&(0x7f00000002c0)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_CROP(r0, 0xc038563c, &(0x7f0000000700)={0x1, 0x0, {0x0, 0x100000001}}) sendto$inet(r0, 0x0, 0x2ba, 0x400200007fe, &(0x7f00000000c0)={0x2, 0x4004e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, 0x0, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000180)={&(0x7f0000000100)=@in6={0xa, 0x4e22, 0x0, @empty, 0x3}, 0x1c, &(0x7f0000000140)=[{&(0x7f0000000280)="e3c43d394bbf647ffe29ef4b6b9390d91c", 0x11}], 0x1, 0x0, 0x0, 0x4000800}, 0x4000001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff012}], 0x1, &(0x7f0000000200)=""/20, 0xd57}, 0x300) 07:40:09 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c1, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/current\x00', 0x2, 0x0) 07:40:09 executing program 2: r0 = getpid() getpriority(0x0, r0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000006e40)={0x11, 0xf}, 0x14) 07:40:09 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x4, 0x0, [{}, {}, {0x0, 0x0, 0x0, [], 0x7fff}]}}) 07:40:09 executing program 5: clone(0x200000041fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setsig(0x4203, r0, 0x0, 0x0) [ 880.764793][T17213] kobject: 'kvm' (0000000005a4cb69): kobject_uevent_env [ 880.765294][ T3881] kobject: 'loop1' (00000000793c7074): kobject_uevent_env [ 880.801421][ T3881] kobject: 'loop1' (00000000793c7074): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 880.812918][T17213] kobject: 'kvm' (0000000005a4cb69): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 880.833102][ T3881] kobject: 'loop2' (000000005137f545): kobject_uevent_env [ 880.840319][ T3881] kobject: 'loop2' (000000005137f545): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 880.878909][ T3881] kobject: 'loop0' (00000000a590645f): kobject_uevent_env [ 880.895420][ T3881] kobject: 'loop0' (00000000a590645f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 880.907787][T17211] kobject: 'kvm' (0000000005a4cb69): kobject_uevent_env [ 880.915290][T17211] kobject: 'kvm' (0000000005a4cb69): fill_kobj_path: path = '/devices/virtual/misc/kvm' 07:40:09 executing program 3: clone(0x200000041fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f00000000c0)) ptrace(0x10, r0) 07:40:09 executing program 2: r0 = getpid() getpriority(0x0, r0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000006e40)={0x11, 0xf}, 0x14) 07:40:09 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c1, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/current\x00', 0x2, 0x0) 07:40:09 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x4, 0x0, [{}, {}, {0x0, 0x0, 0x0, [], 0x7fff}]}}) [ 880.993027][ T3881] kobject: 'loop3' (00000000ec7bfb30): kobject_uevent_env [ 881.000215][ T3881] kobject: 'loop3' (00000000ec7bfb30): fill_kobj_path: path = '/devices/virtual/block/loop3' 07:40:09 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x40c1, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/current\x00', 0x2, 0x0) 07:40:09 executing program 2: r0 = getpid() getpriority(0x0, r0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket(0x10, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bind$packet(r1, &(0x7f0000006e40)={0x11, 0xf}, 0x14) [ 881.050081][ T3881] kobject: 'loop4' (000000000804b333): kobject_uevent_env [ 881.057539][ T3881] kobject: 'loop4' (000000000804b333): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 881.072198][T17332] kobject: 'kvm' (0000000005a4cb69): kobject_uevent_env 07:40:09 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x40c1, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/current\x00', 0x2, 0x0) [ 881.106200][T17332] kobject: 'kvm' (0000000005a4cb69): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 881.121438][ T3881] kobject: 'loop0' (00000000a590645f): kobject_uevent_env [ 881.136691][ T3881] kobject: 'loop0' (00000000a590645f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 881.176348][ T3881] kobject: 'loop2' (000000005137f545): kobject_uevent_env [ 881.192370][ T3881] kobject: 'loop2' (000000005137f545): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 881.219269][ T3881] kobject: 'loop0' (00000000a590645f): kobject_uevent_env [ 881.222431][T17330] kobject: 'kvm' (0000000005a4cb69): kobject_uevent_env [ 881.226856][ T3881] kobject: 'loop0' (00000000a590645f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 881.239589][T17330] kobject: 'kvm' (0000000005a4cb69): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 881.248577][ T3881] kobject: 'loop2' (000000005137f545): kobject_uevent_env [ 881.265794][ T3881] kobject: 'loop2' (000000005137f545): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 881.288502][ T3881] kobject: 'loop4' (000000000804b333): kobject_uevent_env [ 881.296202][ T3881] kobject: 'loop4' (000000000804b333): fill_kobj_path: path = '/devices/virtual/block/loop4' 07:40:10 executing program 1: ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) syz_open_dev$dmmidi(&(0x7f00000002c0)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_CROP(r0, 0xc038563c, &(0x7f0000000700)={0x1, 0x0, {0x0, 0x100000001}}) sendto$inet(r0, 0x0, 0x2ba, 0x400200007fe, &(0x7f00000000c0)={0x2, 0x4004e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, 0x0, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000180)={&(0x7f0000000100)=@in6={0xa, 0x4e22, 0x0, @empty, 0x3}, 0x1c, &(0x7f0000000140)=[{&(0x7f0000000280)="e3c43d394bbf647ffe29ef4b6b9390d91c", 0x11}], 0x1, 0x0, 0x0, 0x4000800}, 0x4000001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff012}], 0x1, &(0x7f0000000200)=""/20, 0xd57}, 0x300) 07:40:10 executing program 2: r0 = getpid() getpriority(0x0, r0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket(0x10, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bind$packet(r1, &(0x7f0000006e40)={0x11, 0xf}, 0x14) 07:40:10 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000180)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x4, 0x0, [{}, {}, {0x0, 0x0, 0x0, [], 0x7fff}]}}) 07:40:10 executing program 5: clone(0x200000041fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f00000000c0)) ptrace(0x10, r0) 07:40:10 executing program 0: openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/current\x00', 0x2, 0x0) [ 881.641190][T17451] kobject: 'kvm' (0000000005a4cb69): kobject_uevent_env [ 881.641512][ T3881] kobject: 'loop1' (00000000793c7074): kobject_uevent_env [ 881.648434][T17451] kobject: 'kvm' (0000000005a4cb69): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 881.672000][ T3881] kobject: 'loop1' (00000000793c7074): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 881.717980][ T3881] kobject: 'loop2' (000000005137f545): kobject_uevent_env [ 881.729207][ T3881] kobject: 'loop2' (000000005137f545): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 881.744575][ T3881] kobject: 'loop0' (00000000a590645f): kobject_uevent_env [ 881.751687][T17450] kobject: 'kvm' (0000000005a4cb69): kobject_uevent_env [ 881.751788][ T3881] kobject: 'loop0' (00000000a590645f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 881.760241][T17450] kobject: 'kvm' (0000000005a4cb69): fill_kobj_path: path = '/devices/virtual/misc/kvm' 07:40:10 executing program 3: clone(0x200000041fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() ptrace(0x10, r0) 07:40:10 executing program 2: r0 = getpid() getpriority(0x0, r0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket(0x10, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bind$packet(r1, &(0x7f0000006e40)={0x11, 0xf}, 0x14) 07:40:10 executing program 0: openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) 07:40:10 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000180)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x4, 0x0, [{}, {}, {0x0, 0x0, 0x0, [], 0x7fff}]}}) [ 881.811540][ T3881] kobject: 'loop4' (000000000804b333): kobject_uevent_env [ 881.818756][ T3881] kobject: 'loop4' (000000000804b333): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 881.866296][ T3881] kobject: 'loop3' (00000000ec7bfb30): kobject_uevent_env [ 881.902787][ T3881] kobject: 'loop3' (00000000ec7bfb30): fill_kobj_path: path = '/devices/virtual/block/loop3' 07:40:10 executing program 0: openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) 07:40:10 executing program 3: clone(0x200000041fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() ptrace(0x10, r0) [ 881.924130][T17568] kobject: 'kvm' (0000000005a4cb69): kobject_uevent_env [ 881.962841][T17568] kobject: 'kvm' (0000000005a4cb69): fill_kobj_path: path = '/devices/virtual/misc/kvm' 07:40:10 executing program 2: r0 = getpid() getpriority(0x0, r0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bind$packet(r1, &(0x7f0000006e40)={0x11, 0xf}, 0x14) [ 881.966320][ T3881] kobject: 'loop0' (00000000a590645f): kobject_uevent_env [ 881.993717][ T3881] kobject: 'loop0' (00000000a590645f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 882.051400][ T3881] kobject: 'loop2' (000000005137f545): kobject_uevent_env [ 882.081386][T17565] kobject: 'kvm' (0000000005a4cb69): kobject_uevent_env [ 882.082593][ T3881] kobject: 'loop2' (000000005137f545): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 882.105167][ T3881] kobject: 'loop3' (00000000ec7bfb30): kobject_uevent_env [ 882.113376][ T3881] kobject: 'loop3' (00000000ec7bfb30): fill_kobj_path: path = '/devices/virtual/block/loop3' 07:40:10 executing program 1: ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) syz_open_dev$dmmidi(&(0x7f00000002c0)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_CROP(r0, 0xc038563c, &(0x7f0000000700)={0x1, 0x0, {0x0, 0x100000001}}) sendto$inet(r0, 0x0, 0x2ba, 0x400200007fe, &(0x7f00000000c0)={0x2, 0x4004e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, 0x0, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000180)={&(0x7f0000000100)=@in6={0xa, 0x4e22, 0x0, @empty, 0x3}, 0x1c, &(0x7f0000000140)=[{&(0x7f0000000280)="e3c43d394bbf647ffe29ef4b6b9390d91c", 0x11}], 0x1, 0x0, 0x0, 0x4000800}, 0x4000001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff012}], 0x1, &(0x7f0000000200)=""/20, 0xd57}, 0x300) 07:40:10 executing program 0: openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) 07:40:10 executing program 3: clone(0x200000041fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() ptrace(0x10, r0) [ 882.176871][T17565] kobject: 'kvm' (0000000005a4cb69): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 882.184373][ T3881] kobject: 'loop2' (000000005137f545): kobject_uevent_env [ 882.205744][ T3881] kobject: 'loop2' (000000005137f545): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 882.250867][ T3881] kobject: 'loop1' (00000000793c7074): kobject_uevent_env [ 882.260130][ T3881] kobject: 'loop1' (00000000793c7074): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 882.285034][ T3881] kobject: 'loop4' (000000000804b333): kobject_uevent_env [ 882.292303][ T3881] kobject: 'loop4' (000000000804b333): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 882.311836][ T3881] kobject: 'loop3' (00000000ec7bfb30): kobject_uevent_env [ 882.319105][ T3881] kobject: 'loop3' (00000000ec7bfb30): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 882.339493][ T3881] kobject: 'loop0' (00000000a590645f): kobject_uevent_env [ 882.353088][ T3881] kobject: 'loop0' (00000000a590645f): fill_kobj_path: path = '/devices/virtual/block/loop0' 07:40:10 executing program 5: clone(0x200000041fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f00000000c0)) 07:40:10 executing program 2: r0 = getpid() getpriority(0x0, r0) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bind$packet(r1, &(0x7f0000006e40)={0x11, 0xf}, 0x14) 07:40:10 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000180)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x4, 0x0, [{}, {}, {0x0, 0x0, 0x0, [], 0x7fff}]}}) 07:40:10 executing program 3: clone(0x200000041fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_tgsigqueueinfo(0x0, 0x0, 0x4000000000014, &(0x7f00000000c0)) ptrace(0x10, 0x0) 07:40:10 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x10000) setsockopt$inet6_int(r1, 0x29, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, 0x0, 0x0) rt_sigqueueinfo(0x0, 0x0, 0x0) 07:40:11 executing program 3: clone(0x200000041fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_tgsigqueueinfo(0x0, 0x0, 0x4000000000014, &(0x7f00000000c0)) ptrace(0x10, 0x0) 07:40:11 executing program 2: getpid() ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bind$packet(r0, &(0x7f0000006e40)={0x11, 0xf}, 0x14) [ 882.473902][T17709] kobject: 'kvm' (0000000005a4cb69): kobject_uevent_env [ 882.482320][ T3881] kobject: 'loop3' (00000000ec7bfb30): kobject_uevent_env [ 882.495191][ T3881] kobject: 'loop3' (00000000ec7bfb30): fill_kobj_path: path = '/devices/virtual/block/loop3' 07:40:11 executing program 3: clone(0x200000041fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_tgsigqueueinfo(0x0, 0x0, 0x4000000000014, &(0x7f00000000c0)) ptrace(0x10, 0x0) 07:40:11 executing program 2: getpid() ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bind$packet(r0, &(0x7f0000006e40)={0x11, 0xf}, 0x14) [ 882.520121][T17709] kobject: 'kvm' (0000000005a4cb69): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 882.536943][ T3881] kobject: 'loop2' (000000005137f545): kobject_uevent_env [ 882.544792][ T3881] kobject: 'loop2' (000000005137f545): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 882.602928][ T3881] kobject: 'loop3' (00000000ec7bfb30): kobject_uevent_env [ 882.613818][ T3881] kobject: 'loop3' (00000000ec7bfb30): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 882.652619][T17709] kobject: 'kvm' (0000000005a4cb69): kobject_uevent_env [ 882.675048][T17709] kobject: 'kvm' (0000000005a4cb69): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 882.726261][ T3881] kobject: 'loop0' (00000000a590645f): kobject_uevent_env [ 882.734615][ T3881] kobject: 'loop0' (00000000a590645f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 882.748197][ T3881] kobject: 'loop2' (000000005137f545): kobject_uevent_env [ 882.762753][ T3881] kobject: 'loop2' (000000005137f545): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 882.773964][ T3881] kobject: 'loop4' (000000000804b333): kobject_uevent_env [ 882.781192][ T3881] kobject: 'loop4' (000000000804b333): fill_kobj_path: path = '/devices/virtual/block/loop4' 07:40:11 executing program 1: ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) syz_open_dev$dmmidi(&(0x7f00000002c0)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_CROP(r0, 0xc038563c, &(0x7f0000000700)={0x1, 0x0, {0x0, 0x100000001}}) sendto$inet(r0, 0x0, 0x2ba, 0x400200007fe, &(0x7f00000000c0)={0x2, 0x4004e23, @local}, 0x10) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000600)=@vsock={0x28, 0x0, 0x2711}, 0x80) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, 0x0, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000180)={&(0x7f0000000100)=@in6={0xa, 0x4e22, 0x0, @empty, 0x3}, 0x1c, &(0x7f0000000140)=[{&(0x7f0000000280)="e3c43d394bbf647ffe29ef4b6b9390d91c", 0x11}], 0x1, 0x0, 0x0, 0x4000800}, 0x4000001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff012}], 0x1, &(0x7f0000000200)=""/20, 0xd57}, 0x300) 07:40:11 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f00000000c0)) ptrace(0x10, r0) 07:40:11 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bind$packet(r0, &(0x7f0000006e40)={0x11, 0xf}, 0x14) [ 883.063146][ T3881] kobject: 'loop1' (00000000793c7074): kobject_uevent_env [ 883.077750][ T3881] kobject: 'loop1' (00000000793c7074): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 883.116696][ T3881] kobject: 'loop3' (00000000ec7bfb30): kobject_uevent_env [ 883.124165][ T3881] kobject: 'loop3' (00000000ec7bfb30): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 883.152341][ T3881] kobject: 'loop2' (000000005137f545): kobject_uevent_env [ 883.159528][ T3881] kobject: 'loop2' (000000005137f545): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 883.178584][ T3881] kobject: 'loop1' (00000000793c7074): kobject_uevent_env [ 883.186219][ T3881] kobject: 'loop1' (00000000793c7074): fill_kobj_path: path = '/devices/virtual/block/loop1' 07:40:11 executing program 5: clone(0x200000041fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() 07:40:11 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, 0x0) write$9p(r0, &(0x7f0000000800)="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", 0x600) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x10000) setsockopt$inet6_int(r1, 0x29, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, 0x0, 0x0) rt_sigqueueinfo(0x0, 0x0, 0x0) 07:40:11 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, 0x0) 07:40:11 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f00000000c0)) ptrace(0x10, r0) 07:40:11 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bind$packet(r0, &(0x7f0000006e40)={0x11, 0xf}, 0x14) 07:40:11 executing program 1: ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) syz_open_dev$dmmidi(&(0x7f00000002c0)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_CROP(r0, 0xc038563c, &(0x7f0000000700)={0x1, 0x0, {0x0, 0x100000001}}) sendto$inet(r0, 0x0, 0x2ba, 0x400200007fe, &(0x7f00000000c0)={0x2, 0x4004e23, @local}, 0x10) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000600)=@vsock={0x28, 0x0, 0x2711}, 0x80) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, 0x0, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000180)={&(0x7f0000000100)=@in6={0xa, 0x4e22, 0x0, @empty, 0x3}, 0x1c, &(0x7f0000000140)=[{&(0x7f0000000280)="e3c43d394bbf647ffe29ef4b6b9390d91c", 0x11}], 0x1, 0x0, 0x0, 0x4000800}, 0x4000001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff012}], 0x1, &(0x7f0000000200)=""/20, 0xd57}, 0x300) [ 883.337764][ T26] kauditd_printk_skb: 8 callbacks suppressed [ 883.337777][ T26] audit: type=1800 audit(1559634011.864:78): pid=17854 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17121 res=0 [ 883.339057][T17853] kobject: 'kvm' (0000000005a4cb69): kobject_uevent_env 07:40:11 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f00000000c0)) ptrace(0x10, r0) 07:40:11 executing program 5: clone(0x200000041fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 883.358159][ T26] audit: type=1804 audit(1559634011.884:79): pid=17854 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir713315730/syzkaller.V7Z48T/1189/file0" dev="sda1" ino=17121 res=1 [ 883.371633][ T3881] kobject: 'loop3' (00000000ec7bfb30): kobject_uevent_env 07:40:11 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bind$packet(r0, &(0x7f0000006e40)={0x11, 0xf}, 0x14) 07:40:11 executing program 1: ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) syz_open_dev$dmmidi(&(0x7f00000002c0)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_CROP(r0, 0xc038563c, &(0x7f0000000700)={0x1, 0x0, {0x0, 0x100000001}}) sendto$inet(r0, 0x0, 0x2ba, 0x400200007fe, &(0x7f00000000c0)={0x2, 0x4004e23, @local}, 0x10) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000600)=@vsock={0x28, 0x0, 0x2711}, 0x80) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, 0x0, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000180)={&(0x7f0000000100)=@in6={0xa, 0x4e22, 0x0, @empty, 0x3}, 0x1c, &(0x7f0000000140)=[{&(0x7f0000000280)="e3c43d394bbf647ffe29ef4b6b9390d91c", 0x11}], 0x1, 0x0, 0x0, 0x4000800}, 0x4000001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff012}], 0x1, &(0x7f0000000200)=""/20, 0xd57}, 0x300) [ 883.448991][T17853] kobject: 'kvm' (0000000005a4cb69): fill_kobj_path: path = '/devices/virtual/misc/kvm' 07:40:12 executing program 1: ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) syz_open_dev$dmmidi(&(0x7f00000002c0)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_CROP(r0, 0xc038563c, &(0x7f0000000700)={0x1, 0x0, {0x0, 0x100000001}}) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000600)=@vsock={0x28, 0x0, 0x2711}, 0x80) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, 0x0, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000180)={&(0x7f0000000100)=@in6={0xa, 0x4e22, 0x0, @empty, 0x3}, 0x1c, &(0x7f0000000140)=[{&(0x7f0000000280)="e3c43d394bbf647ffe29ef4b6b9390d91c", 0x11}], 0x1, 0x0, 0x0, 0x4000800}, 0x4000001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff012}], 0x1, &(0x7f0000000200)=""/20, 0xd57}, 0x300) 07:40:12 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:40:12 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f00000000c0)) ptrace(0x10, r0) [ 883.512690][ T3881] kobject: 'loop3' (00000000ec7bfb30): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 883.534669][T17853] kobject: 'kvm' (0000000005a4cb69): kobject_uevent_env [ 883.547214][T17853] kobject: 'kvm' (0000000005a4cb69): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 883.573096][ T3881] kobject: 'loop2' (000000005137f545): kobject_uevent_env [ 883.585451][ T3881] kobject: 'loop2' (000000005137f545): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 883.628774][ T3881] kobject: 'loop1' (00000000793c7074): kobject_uevent_env [ 883.640805][ T3881] kobject: 'loop1' (00000000793c7074): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 883.661282][ T3881] kobject: 'loop3' (00000000ec7bfb30): kobject_uevent_env [ 883.669024][ T3881] kobject: 'loop3' (00000000ec7bfb30): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 883.684270][ T3881] kobject: 'loop2' (000000005137f545): kobject_uevent_env [ 883.707712][ T3881] kobject: 'loop2' (000000005137f545): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 883.719533][ T3881] kobject: 'loop4' (000000000804b333): kobject_uevent_env 07:40:12 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, 0x0) write$9p(r0, &(0x7f0000000800)="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