t$inet6(0xa, 0x40000080806, 0x0) listen(r0, 0x0) bind$inet6(r0, &(0x7f000047b000), 0x1c) 03:55:09 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x3}, 0x8, 0x0) 03:55:09 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000180)=""/103) 03:55:09 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) connect$ax25(r0, &(0x7f0000000240)={{0x3, @default}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @bcast, @default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 03:55:09 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000180)=""/103) 03:55:09 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000), 0x1c) [ 1513.037414][T30699] ax25_connect(): syz-executor.5 uses autobind, please contact jreuter@yaina.de 03:55:17 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000), 0x1c) 03:55:17 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000180)=""/103) 03:55:17 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0x3, 0x0, 0x0, 0x0, 0xee01}}) 03:55:17 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000180)=0xc) pipe(&(0x7f0000000340)={0xffffffffffffffff}) fstat(r2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000080)='./file0\x00', r1, r3) 03:55:17 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x6800000000000000, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:55:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 03:55:17 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000), 0x1c) 03:55:17 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000180)=""/103) 03:55:17 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$tipc(r0, &(0x7f0000000040)=@id, 0x10) 03:55:17 executing program 3: listen(0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f000047b000), 0x1c) 03:55:17 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000180)=""/103) 03:55:17 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$tipc(r0, &(0x7f0000000040)=@id, 0x10) 03:55:17 executing program 3: listen(0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f000047b000), 0x1c) 03:55:17 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$tipc(r0, &(0x7f0000000040)=@id, 0x10) 03:55:17 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000180)=""/103) 03:55:26 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) 03:55:26 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$tipc(r0, &(0x7f0000000040)=@id, 0x10) 03:55:26 executing program 3: listen(0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f000047b000), 0x1c) 03:55:26 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000180)=""/103) 03:55:26 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x6c00000000000000, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:55:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 03:55:26 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x0) bind$inet6(r0, &(0x7f000047b000), 0x1c) 03:55:26 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000180)=""/103) 03:55:26 executing program 5: connect$tipc(0xffffffffffffffff, &(0x7f0000000040)=@id, 0x10) 03:55:26 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000180)=""/103) 03:55:27 executing program 5: connect$tipc(0xffffffffffffffff, &(0x7f0000000040)=@id, 0x10) 03:55:27 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x0) bind$inet6(r0, &(0x7f000047b000), 0x1c) 03:55:35 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r3, r1) sendmsg$netlink(r4, &(0x7f0000028fc8)={0x0, 0x0, 0x0}, 0x0) poll(&(0x7f0000000100)=[{r0}, {r2}], 0x2, 0x0) 03:55:35 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000180)=""/103) 03:55:35 executing program 5: connect$tipc(0xffffffffffffffff, &(0x7f0000000040)=@id, 0x10) 03:55:35 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) listen(r0, 0x0) bind$inet6(r0, &(0x7f000047b000), 0x1c) 03:55:35 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x7400000000000000, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:55:35 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 03:55:35 executing program 5: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$tipc(r0, &(0x7f0000000040)=@id, 0x10) 03:55:35 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000180)=""/103) 03:55:35 executing program 5: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$tipc(r0, &(0x7f0000000040)=@id, 0x10) 03:55:35 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) listen(0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f000047b000), 0x1c) 03:55:35 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000180)=""/103) 03:55:35 executing program 5: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$tipc(r0, &(0x7f0000000040)=@id, 0x10) 03:55:44 executing program 0: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) flistxattr(r0, 0x0, 0x0) 03:55:44 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) listen(0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f000047b000), 0x1c) 03:55:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000180)=""/103) 03:55:44 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, 0x0) connect$tipc(0xffffffffffffffff, &(0x7f0000000040)=@id, 0x10) 03:55:44 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x7a00000000000000, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:55:44 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)}}], 0x2, 0x0, 0x0) 03:55:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000180)=""/103) 03:55:44 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, 0x0) connect$tipc(0xffffffffffffffff, &(0x7f0000000040)=@id, 0x10) 03:55:44 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) listen(0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f000047b000), 0x1c) 03:55:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000180)=""/103) 03:55:44 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, 0x0) connect$tipc(0xffffffffffffffff, &(0x7f0000000040)=@id, 0x10) 03:55:44 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f000047b000), 0x1c) 03:55:51 executing program 0: r0 = socket$inet6(0xa, 0x100000000000001, 0x84) getsockopt$bt_hci(r0, 0x84, 0x0, &(0x7f0000000080)=""/4096, &(0x7f0000001140)=0x1000) 03:55:51 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f000047b000), 0x1c) 03:55:51 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)}}], 0x2, 0x0, 0x0) 03:55:51 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x8cffffff00000000, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:55:51 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) connect$tipc(0xffffffffffffffff, &(0x7f0000000040)=@id, 0x10) 03:55:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000180)=""/103) 03:55:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000180)=""/103) 03:55:51 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) connect$tipc(0xffffffffffffffff, &(0x7f0000000040)=@id, 0x10) 03:55:51 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f000047b000), 0x1c) 03:55:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgctl$MSG_STAT(0x0, 0xb, 0x0) 03:55:51 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) connect$tipc(0xffffffffffffffff, &(0x7f0000000040)=@id, 0x10) 03:55:52 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r0, 0x0) bind$inet6(r0, 0x0, 0x0) 03:55:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgctl$MSG_STAT(0x0, 0xb, 0x0) 03:55:59 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r0, 0x0) bind$inet6(r0, 0x0, 0x0) 03:55:59 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$tipc(r0, 0x0, 0x0) 03:55:59 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x1d5, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r3}, 0x10, &(0x7f0000000280)={&(0x7f0000000240)=@can={{0x0, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, "418350e01b85354f"}, 0x10}}, 0x0) 03:55:59 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x97ffffff00000000, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:55:59 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgctl$MSG_STAT(0x0, 0xb, 0x0) 03:55:59 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)}}], 0x2, 0x0, 0x0) 03:55:59 executing program 2: 03:55:59 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$tipc(r0, 0x0, 0x0) 03:55:59 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r0, 0x0) bind$inet6(r0, 0x0, 0x0) 03:55:59 executing program 2: 03:55:59 executing program 2: 03:55:59 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$tipc(r0, 0x0, 0x0) 03:55:59 executing program 3: 03:56:07 executing program 0: 03:56:07 executing program 2: 03:56:07 executing program 3: 03:56:07 executing program 5: 03:56:07 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0xf6ffffff00000000, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:56:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 03:56:07 executing program 2: 03:56:07 executing program 3: 03:56:07 executing program 5: 03:56:07 executing program 3: 03:56:07 executing program 5: 03:56:07 executing program 2: 03:56:13 executing program 0: 03:56:13 executing program 3: 03:56:13 executing program 5: 03:56:13 executing program 2: 03:56:13 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0xfdfdffff00000000, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:56:13 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 03:56:13 executing program 3: 03:56:13 executing program 5: 03:56:13 executing program 2: 03:56:13 executing program 5: 03:56:13 executing program 3: 03:56:13 executing program 2: 03:56:17 executing program 0: 03:56:17 executing program 5: 03:56:17 executing program 3: 03:56:17 executing program 2: 03:56:17 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0xfdffffff00000000, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:56:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000700)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 03:56:17 executing program 5: 03:56:17 executing program 2: 03:56:17 executing program 3: 03:56:17 executing program 5: 03:56:17 executing program 2: 03:56:17 executing program 3: 03:56:21 executing program 0: 03:56:21 executing program 5: 03:56:21 executing program 3: 03:56:21 executing program 2: 03:56:21 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0xffffffff00000000, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:56:21 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 03:56:21 executing program 2: 03:56:22 executing program 3: 03:56:22 executing program 5: 03:56:22 executing program 3: 03:56:22 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x1801}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x3fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x12}, 0x0, 0x0, 0x10001, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ppoll(0x0, 0x0, &(0x7f0000000140), 0x0, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffbb) lsetxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r4, 0x0, 0x91ffffff, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) ioctl$PPPIOCSCOMPRESS(0xffffffffffffffff, 0x4010744d) splice(r4, 0x0, r3, 0x0, 0x1000000000000003, 0x0) inotify_init1(0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0xffffffffffffffbd) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) sendto$packet(r4, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) 03:56:22 executing program 5: 03:56:26 executing program 0: 03:56:26 executing program 3: 03:56:26 executing program 5: 03:56:26 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0xffffffffa0008000, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:56:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 03:56:26 executing program 2: 03:56:26 executing program 5: 03:56:26 executing program 2: 03:56:26 executing program 3: 03:56:26 executing program 2: 03:56:26 executing program 3: 03:56:26 executing program 5: 03:56:30 executing program 0: 03:56:30 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) socketpair(0x9, 0x800, 0x0, &(0x7f00000000c0)) 03:56:30 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='io\x00') getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, 0x0, 0x0) r1 = gettid() epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) tkill(r1, 0x1000000000016) 03:56:30 executing program 5: 03:56:30 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0xffffffffa0010000, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:56:30 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write(r1, &(0x7f0000000080)="00286eb4fa920000000000000000", 0xffffffc7) perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000006cc0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000840)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 03:56:30 executing program 5: 03:56:30 executing program 2: 03:56:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000380), 0x12) 03:56:30 executing program 2: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000003, 0x5c831, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/rt6_stats\x00') 03:56:30 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=ANY=[@ANYBLOB="b7000000000000003c000000000000001d000000000000fd9500000000002000"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195}, 0x48) 03:56:30 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@acquire={0x16c, 0x17, 0x229, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev}, {@in=@loopback, @in6=@local}, {{@in6=@rand_addr="9ac583ffab16f1e444230d2f25d8fb0d", @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x44, 0x5, [{{@in6=@remote, 0x0, 0x6c}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x1}]}]}, 0x16c}}, 0x0) 03:56:34 executing program 0: r0 = socket$inet(0x2b, 0x801, 0x0) listen(r0, 0x0) 03:56:34 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f000063de2c)=@newsa={0x13c, 0x10, 0x713, 0x0, 0x0, {{@in6=@dev}, {@in6=@mcast2, 0x0, 0x32}, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_aead={0x4c, 0x12, {{'rfc4106(gcm(aes))\x00'}}}]}, 0x13c}}, 0x0) 03:56:34 executing program 3: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x8}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000002780)=[{{0x0, 0x363, &(0x7f0000000200)=[{&(0x7f0000000140), 0x304}], 0x8}, 0x2}], 0x13, 0x0) 03:56:34 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@acquire={0x16c, 0x17, 0x229, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev}, {@in=@loopback, @in6=@local}, {{@in6=@rand_addr="9ac583ffab16f1e444230d2f25d8fb0d", @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x44, 0x5, [{{@in6=@remote, 0x0, 0x6c}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x1}]}]}, 0x16c}}, 0x0) 03:56:34 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0xffffffffffffffff, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:56:34 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000540)={0xb, 'syz0\x00', 'syz0\x00', 'syz1\x00', 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "90"}, 0x119) [ 1598.061170][T27733] hid-generic 0000:0000:0000.0009: hidraw0: HID v0.00 Device [syz0] on syz0 03:56:34 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@acquire={0x16c, 0x17, 0x229, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev}, {@in=@loopback, @in6=@local}, {{@in6=@rand_addr="9ac583ffab16f1e444230d2f25d8fb0d", @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x44, 0x5, [{{@in6=@remote, 0x0, 0x6c}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x1}]}]}, 0x16c}}, 0x0) 03:56:34 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 03:56:34 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[], 0x0) 03:56:34 executing program 2: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000003, 0x5c831, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/rt6_stats\x00') 03:56:34 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@acquire={0x16c, 0x17, 0x229, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev}, {@in=@loopback, @in6=@local}, {{@in6=@rand_addr="9ac583ffab16f1e444230d2f25d8fb0d", @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x44, 0x5, [{{@in6=@remote, 0x0, 0x6c}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x1}]}]}, 0x16c}}, 0x0) 03:56:34 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x1, 0x0, 0x2000, &(0x7f0000013000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000008000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) pwrite64(r3, &(0x7f0000000200)='C', 0x1, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000002000/0x2000)=nil}) [ 1598.427790][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1598.433835][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1598.907857][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1598.907911][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1598.913779][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1598.919528][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1598.930974][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1598.936825][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1598.942748][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:56:38 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000ff01000000040004000800050001001000080006000000000008000300950d03008c629a1c1f12f0d2e3a01f8b00bfd38cddefc731df6d8418"], 0x30}, 0x1, 0x6c}, 0x0) 03:56:38 executing program 0: r0 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000000)={0x8, 0x0, &(0x7f0000000040)=[@increfs={0x40486311}], 0x0, 0x0, 0x0}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 03:56:38 executing program 3: 03:56:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="240000005a0007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 03:56:38 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x2}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:56:38 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 03:56:38 executing program 3: socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000000)={0x8, 0x0, &(0x7f0000000040)=[@increfs={0x40486311}], 0x0, 0x0, 0x0}) [ 1602.249384][T31272] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 03:56:38 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000005c0)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0xc8175) [ 1602.298511][T31272] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 1602.313822][T31277] netlink: 'syz-executor.5': attribute type 5 has an invalid length. [ 1602.336891][T31277] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 1602.348575][ C0] protocol 88fb is buggy, dev hsr_slave_0 03:56:38 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000ff01000000040004000800050001001000080006000000000008000300950d03008c629a1c1f12f0d2e3a01f8b00bfd38cddefc731df6d8418"], 0x30}, 0x1, 0x6c}, 0x0) 03:56:38 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x3}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:56:38 executing program 3: 03:56:38 executing program 2: 03:56:38 executing program 3: [ 1602.580146][T31299] netlink: 'syz-executor.5': attribute type 5 has an invalid length. [ 1602.599731][T31299] netlink: 'syz-executor.5': attribute type 6 has an invalid length. 03:56:44 executing program 0: 03:56:44 executing program 5: 03:56:44 executing program 3: 03:56:44 executing program 2: 03:56:44 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x5}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:56:44 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 03:56:44 executing program 5: 03:56:44 executing program 2: 03:56:44 executing program 3: [ 1608.597943][ C0] net_ratelimit: 3 callbacks suppressed [ 1608.597951][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1608.609617][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:56:45 executing program 3: 03:56:45 executing program 2: 03:56:45 executing program 5: [ 1608.827793][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1608.833758][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1609.307783][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1609.313680][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1609.317786][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1609.319666][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1609.326040][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1609.331750][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:56:51 executing program 0: 03:56:51 executing program 2: 03:56:51 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x6}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:56:51 executing program 5: 03:56:51 executing program 3: 03:56:51 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 03:56:51 executing program 3: 03:56:51 executing program 5: clone(0x84007bf7, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() prctl$PR_SET_TIMERSLACK(0x1d, 0xfffffffffffff741) mknod(&(0x7f0000000180)='./file0\x00', 0x113e, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ptrace(0x10, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) prctl$PR_GET_TIMERSLACK(0x1e) ptrace(0x11, r0) 03:56:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{0x304}, "b2a7252d7667f45f", "079f0000f400", "8be57d14", "a435b8f1d226a342"}, 0x28) poll(&(0x7f0000000340)=[{r0}], 0x1, 0x0) [ 1614.827790][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1614.833728][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:56:51 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) 03:56:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{0x304}, "b2a7252d7667f45f", "079f0000f400", "8be57d14", "a435b8f1d226a342"}, 0x28) poll(&(0x7f0000000340)=[{r0}], 0x1, 0x0) 03:56:51 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x7}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) [ 1615.067782][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1615.073684][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1615.547885][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1615.547889][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1615.547939][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1615.553733][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:56:55 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r0, &(0x7f0000000080)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "b20d270f7caa9830583b8824e7f27c6abd23eefdc862079d858d551d4bb3af5f4fbfe063fc2efe69dec0b4a43dcca04aae9d989b2b954e4517f47b2db50076", 0x39}, 0x60) 03:56:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{0x304}, "b2a7252d7667f45f", "079f0000f400", "8be57d14", "a435b8f1d226a342"}, 0x28) poll(&(0x7f0000000340)=[{r0}], 0x1, 0x0) 03:56:55 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) 03:56:55 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x8}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:56:55 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 03:56:55 executing program 5: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r1, r0, 0x0) 03:56:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{0x304}, "b2a7252d7667f45f", "079f0000f400", "8be57d14", "a435b8f1d226a342"}, 0x28) poll(&(0x7f0000000340)=[{r0}], 0x1, 0x0) 03:56:55 executing program 5: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000000080)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "b20d270f7caa9830583b8824e7f27c6abd23eefdc862079d858d551d4bb3af5f4fbfe063fc2efe69dec0b4a43dcca04aae9d989b2b954e4517f47b2db50076"}, 0x60) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r1, r0, 0x0) 03:56:55 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) [ 1618.997783][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1619.004369][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:56:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) poll(&(0x7f0000000340)=[{r0}], 0x1, 0x0) 03:56:55 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x9}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:56:55 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) 03:57:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) poll(&(0x7f0000000340)=[{r0}], 0x1, 0x0) 03:57:01 executing program 5: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000000080)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "b20d270f7caa9830583b8824e7f27c6abd23eefdc862079d858d551d4bb3af5f4fbfe063fc2efe69dec0b4a43dcca04aae9d989b2b954e4517f47b2db50076"}, 0x60) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r1, r0, 0x0) 03:57:01 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) 03:57:01 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0xa}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:57:01 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 03:57:01 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:57:01 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x3, 0x0, [0x0, 0x0, 0x0]}) 03:57:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) poll(&(0x7f0000000340)=[{r0}], 0x1, 0x0) [ 1625.227777][ C0] net_ratelimit: 10 callbacks suppressed [ 1625.227784][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1625.239318][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:57:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{0x304}, "b2a7252d7667f45f", "079f0000f400", "8be57d14", "a435b8f1d226a342"}, 0x28) poll(&(0x7f0000000340)=[{r0}], 0x1, 0x0) 03:57:01 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:57:01 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0xb}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:57:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{0x304}, "b2a7252d7667f45f", "079f0000f400", "8be57d14", "a435b8f1d226a342"}, 0x28) poll(&(0x7f0000000340)=[{r0}], 0x1, 0x0) 03:57:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = inotify_init() r3 = socket(0x2, 0x2, 0x0) dup2(r3, r2) 03:57:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{0x304}, "b2a7252d7667f45f", "079f0000f400", "8be57d14", "a435b8f1d226a342"}, 0x28) poll(&(0x7f0000000340)=[{r0}], 0x1, 0x0) [ 1625.467790][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1625.473795][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:57:01 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 1625.947781][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1625.947786][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1625.947836][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1625.953625][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1625.970854][ C1] protocol 88fb is buggy, dev hsr_slave_0 03:57:09 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x12e) readv(r0, &(0x7f0000001680)=[{&(0x7f0000000000)=""/62, 0x3e}, {0x0, 0x3d}], 0x2) write$UHID_DESTROY(r0, &(0x7f0000000280), 0xfed0) 03:57:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{0x304}, "b2a7252d7667f45f", "079f0000f400", "8be57d14", "a435b8f1d226a342"}, 0x28) poll(&(0x7f0000000340)=[{r0}], 0x1, 0x0) 03:57:09 executing program 5: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000180)={0x6, @pix_mp}) 03:57:09 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0xc}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:57:09 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 03:57:09 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) 03:57:09 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000100)='\\vmnet0?\'`@{,vmnet1em0user\x00', 0x4) ftruncate(r0, 0x0) 03:57:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{0x304}, "b2a7252d7667f45f", "079f0000f400", "8be57d14", "a435b8f1d226a342"}, 0x28) poll(&(0x7f0000000340)=[{r0}], 0x1, 0x0) [ 1633.547824][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1633.553674][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:57:10 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) 03:57:10 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0xd}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:57:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{0x304}, "b2a7252d7667f45f", "079f0000f400", "8be57d14", "a435b8f1d226a342"}, 0x28) poll(&(0x7f0000000340)=[{r0}], 0x1, 0x0) 03:57:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{0x304}, "b2a7252d7667f45f", "079f0000f400", "8be57d14", "a435b8f1d226a342"}, 0x28) poll(&(0x7f0000000340)=[{r0}], 0x1, 0x0) [ 1633.797809][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1633.803734][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1634.267845][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1634.273661][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1634.277805][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1634.279627][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1634.285207][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1634.290918][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:57:17 executing program 0: 03:57:17 executing program 5: 03:57:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{0x304}, "b2a7252d7667f45f", "079f0000f400", "8be57d14", "a435b8f1d226a342"}, 0x28) poll(&(0x7f0000000340)=[{r0}], 0x1, 0x0) 03:57:17 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) 03:57:17 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0xe}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:57:17 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 03:57:17 executing program 5: 03:57:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{0x304}, "b2a7252d7667f45f", "079f0000f400", "8be57d14", "a435b8f1d226a342"}, 0x28) poll(&(0x7f0000000340)=[{r0}], 0x1, 0x0) 03:57:17 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_BUFFERS(0xffffffffffffffff, 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_flowlabel\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstatfs(r0, &(0x7f0000000040)=""/4096) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x111}}, 0x20) preadv(r0, &(0x7f00000017c0), 0x2c4, 0x0) 03:57:17 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:57:17 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x10}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:57:17 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{0x304}, "b2a7252d7667f45f", "079f0000f400", "8be57d14", "a435b8f1d226a342"}, 0x28) poll(&(0x7f0000000340)=[{}], 0x1, 0x0) 03:57:21 executing program 0: fsetxattr$security_evm(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x4, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x1, 0x4) write$UHID_CREATE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r3 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0x0, r2) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r2) keyctl$KEYCTL_MOVE(0x1e, r4, r2, r3, 0x0) 03:57:21 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:57:21 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{0x304}, "b2a7252d7667f45f", "079f0000f400", "8be57d14", "a435b8f1d226a342"}, 0x28) poll(&(0x7f0000000340)=[{}], 0x1, 0x0) 03:57:21 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488e57026408ba40bc2e5c994bdbd0d4f902fdb5be4c1e5ff5af3406ec0"], &(0x7f0000000140)=0x8) 03:57:21 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x11}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:57:21 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 03:57:21 executing program 2: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{0x304}, "b2a7252d7667f45f", "079f0000f400", "8be57d14", "a435b8f1d226a342"}, 0x28) poll(&(0x7f0000000340)=[{}], 0x1, 0x0) [ 1644.866239][T31630] IPVS: ftp: loaded support on port[0] = 21 03:57:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{0x304}, "b2a7252d7667f45f", "079f0000f400", "8be57d14", "a435b8f1d226a342"}, 0x28) poll(&(0x7f0000000340)=[{r0}], 0x1, 0x0) 03:57:21 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:57:21 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x12}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:57:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{0x304}, "b2a7252d7667f45f", "079f0000f400", "8be57d14", "a435b8f1d226a342"}, 0x28) poll(&(0x7f0000000340)=[{r0}], 0x1, 0x0) 03:57:21 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) [ 1645.663977][T31641] IPVS: ftp: loaded support on port[0] = 21 03:57:27 executing program 0: 03:57:27 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0xffffffffffffffff}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:57:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{0x304}, "b2a7252d7667f45f", "079f0000f400", "8be57d14", "a435b8f1d226a342"}, 0x28) poll(&(0x7f0000000340)=[{r0}], 0x1, 0x0) 03:57:27 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 03:57:27 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 03:57:27 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488e57026408ba40bc2e5c994bdbd0d4f902fdb5be4c1e5ff5af3406ec0"], &(0x7f0000000140)=0x8) 03:57:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{0x304}, "b2a7252d7667f45f", "079f0000f400", "8be57d14", "a435b8f1d226a342"}, 0x28) poll(&(0x7f0000000340)=[{r0}], 0x1, 0x0) [ 1651.245469][T31696] IPVS: ftp: loaded support on port[0] = 21 03:57:27 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 03:57:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{0x304}, "b2a7252d7667f45f", "079f0000f400", "8be57d14", "a435b8f1d226a342"}, 0x28) poll(&(0x7f0000000340)=[{r0}], 0x1, 0x0) 03:57:27 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="2596c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:57:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{0x304}, "b2a7252d7667f45f", "079f0000f400", "8be57d14", "a435b8f1d226a342"}, 0x28) poll(&(0x7f0000000340)=[{r0}], 0x1, 0x0) 03:57:27 executing program 3: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) 03:57:31 executing program 0: 03:57:31 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{0x304}, "b2a7252d7667f45f", "079f0000f400", "8be57d14", "a435b8f1d226a342"}, 0x28) poll(&(0x7f0000000340)=[{r0}], 0x1, 0x0) 03:57:31 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3096c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:57:31 executing program 3: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) 03:57:31 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488e57026408ba40bc2e5c994bdbd0d4f902fdb5be4c1e5ff5af3406ec0"], &(0x7f0000000140)=0x8) 03:57:31 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 03:57:31 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{0x304}, "b2a7252d7667f45f", "079f0000f400", "8be57d14", "a435b8f1d226a342"}, 0x28) poll(&(0x7f0000000340)=[{r0}], 0x1, 0x0) 03:57:31 executing program 3: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) [ 1655.392604][T31742] IPVS: ftp: loaded support on port[0] = 21 03:57:31 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3196c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:57:31 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{0x304}, "b2a7252d7667f45f", "079f0000f400", "8be57d14", "a435b8f1d226a342"}, 0x28) poll(&(0x7f0000000340)=[{r0}], 0x1, 0x0) 03:57:31 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) 03:57:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{0x304}, "b2a7252d7667f45f", "079f0000f400", "8be57d14", "a435b8f1d226a342"}, 0x28) poll(&(0x7f0000000340)=[{r0}], 0x1, 0x0) 03:57:35 executing program 0: 03:57:35 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3296c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:57:35 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) 03:57:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{0x304}, "b2a7252d7667f45f", "079f0000f400", "8be57d14", "a435b8f1d226a342"}, 0x28) poll(&(0x7f0000000340)=[{r0}], 0x1, 0x0) 03:57:35 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488e57026408ba40bc2e5c994bdbd0d4f902fdb5be4c1e5ff5af3406ec0"], &(0x7f0000000140)=0x8) 03:57:35 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 03:57:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0), 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{0x304}, "b2a7252d7667f45f", "079f0000f400", "8be57d14", "a435b8f1d226a342"}, 0x28) poll(&(0x7f0000000340)=[{r0}], 0x1, 0x0) [ 1659.642016][T31790] IPVS: ftp: loaded support on port[0] = 21 03:57:36 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) 03:57:36 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3396c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:57:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{0x304}, "b2a7252d7667f45f", "079f0000f400", "8be57d14", "a435b8f1d226a342"}, 0x28) poll(&(0x7f0000000340)=[{r0}], 0x1, 0x0) 03:57:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{0x304}, "b2a7252d7667f45f", "079f0000f400", "8be57d14", "a435b8f1d226a342"}, 0x28) poll(&(0x7f0000000340)=[{r0}], 0x1, 0x0) 03:57:36 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) 03:57:40 executing program 0: 03:57:40 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3496c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:57:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{0x304}, "b2a7252d7667f45f", "079f0000f400", "8be57d14", "a435b8f1d226a342"}, 0x28) poll(&(0x7f0000000340)=[{r0}], 0x1, 0x0) 03:57:40 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) 03:57:40 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488e57026408ba40bc2e5c994bdbd0d4f902fdb5be4c1e5ff5af3406ec0"], &(0x7f0000000140)=0x8) 03:57:40 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 03:57:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{0x304}, "b2a7252d7667f45f", "079f0000f400", "8be57d14", "a435b8f1d226a342"}, 0x28) poll(&(0x7f0000000340)=[{r0}], 0x1, 0x0) 03:57:40 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) [ 1663.776107][T31842] IPVS: ftp: loaded support on port[0] = 21 03:57:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{0x304}, "b2a7252d7667f45f", "079f0000f400", "8be57d14", "a435b8f1d226a342"}, 0x28) poll(&(0x7f0000000340)=[{r0}], 0x1, 0x0) 03:57:40 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3596c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:57:40 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) 03:57:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{0x304}, "b2a7252d7667f45f", "079f0000f400", "8be57d14", "a435b8f1d226a342"}, 0x28) poll(&(0x7f0000000340)=[{r0}], 0x1, 0x0) 03:57:44 executing program 0: 03:57:44 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{0x304}, "b2a7252d7667f45f", "079f0000f400", "8be57d14", "a435b8f1d226a342"}, 0x28) poll(&(0x7f0000000340)=[{r0}], 0x1, 0x0) 03:57:44 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3696c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:57:44 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) 03:57:44 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488e57026408ba40bc2e5c994bdbd0d4f902fdb5be4c1e5ff5af3406ec0"], &(0x7f0000000140)=0x8) 03:57:44 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 03:57:44 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{0x304}, "b2a7252d7667f45f", "079f0000f400", "8be57d14", "a435b8f1d226a342"}, 0x28) poll(&(0x7f0000000340)=[{r0}], 0x1, 0x0) 03:57:44 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) [ 1667.954038][T31893] IPVS: ftp: loaded support on port[0] = 21 03:57:44 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{0x304}, "b2a7252d7667f45f", "079f0000f400", "8be57d14", "a435b8f1d226a342"}, 0x28) poll(&(0x7f0000000340)=[{r0}], 0x1, 0x0) 03:57:44 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="6396c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:57:44 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) 03:57:44 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{0x304}, "b2a7252d7667f45f", "079f0000f400", "8be57d14", "a435b8f1d226a342"}, 0x28) poll(&(0x7f0000000340)=[{r0}], 0x1, 0x0) 03:57:48 executing program 0: 03:57:48 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{0x304}, "b2a7252d7667f45f", "079f0000f400", "8be57d14", "a435b8f1d226a342"}, 0x28) poll(&(0x7f0000000340)=[{r0}], 0x1, 0x0) 03:57:48 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) 03:57:48 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a02b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:57:48 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488e57026408ba40bc2e5c994bdbd0d4f902fdb5be4c1e5ff5af3406ec0"], &(0x7f0000000140)=0x8) 03:57:48 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) [ 1672.106007][T31942] IPVS: ftp: loaded support on port[0] = 21 03:57:48 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{0x304}, "b2a7252d7667f45f", "079f0000f400", "8be57d14", "a435b8f1d226a342"}, 0x28) poll(&(0x7f0000000340)=[{r0}], 0x1, 0x0) 03:57:48 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) 03:57:48 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a03b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:57:48 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) 03:57:48 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{0x304}, "b2a7252d7667f45f", "079f0000f400", "8be57d14", "a435b8f1d226a342"}, 0x28) poll(&(0x7f0000000340)=[{r0}], 0x1, 0x0) 03:57:48 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a04b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:57:52 executing program 0: r0 = socket$kcm(0x2b, 0x200000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r1, &(0x7f00000084c0)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000008440)=ANY=[@ANYBLOB="2c00000000000000000000000700000001a01b00000602ac1e00007f0000017f000001ff050000ad14140000000000001c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="ac1414267f000000"], 0x4c}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 03:57:52 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) 03:57:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{0x304}, "b2a7252d7667f45f", "079f0000f400", "8be57d14", "a435b8f1d226a342"}, 0x28) poll(&(0x7f0000000340)=[{r0}], 0x1, 0x0) 03:57:52 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a05b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:57:52 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488e57026408ba40bc2e5c994bdbd0d4f902fdb5be4c1e5ff5af3406ec0"], &(0x7f0000000140)=0x8) 03:57:52 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 03:57:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{0x304}, "b2a7252d7667f45f", "079f0000f400", "8be57d14", "a435b8f1d226a342"}, 0x28) poll(&(0x7f0000000340)=[{r0}], 0x1, 0x0) [ 1676.261774][T31999] IPVS: ftp: loaded support on port[0] = 21 03:57:52 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) 03:57:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, 0x0, 0x0) poll(&(0x7f0000000340)=[{r0}], 0x1, 0x0) 03:57:52 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a06b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:57:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, 0x0, 0x0) poll(&(0x7f0000000340)=[{r0}], 0x1, 0x0) 03:57:52 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) 03:57:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150004008178a80016000f000100e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) 03:57:58 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a07b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:57:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, 0x0, 0x0) poll(&(0x7f0000000340)=[{r0}], 0x1, 0x0) 03:57:58 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) 03:57:58 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488e57026408ba40bc2e5c994bdbd0d4f902fdb5be4c1e5ff5af3406ec0"], &(0x7f0000000140)=0x8) 03:57:58 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) 03:57:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{}, "b2a7252d7667f45f", "079f0000f400", "8be57d14", "a435b8f1d226a342"}, 0x28) poll(&(0x7f0000000340)=[{r0}], 0x1, 0x0) 03:57:58 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) [ 1682.546932][T32050] IPVS: ftp: loaded support on port[0] = 21 03:57:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{}, "b2a7252d7667f45f", "079f0000f400", "8be57d14", "a435b8f1d226a342"}, 0x28) poll(&(0x7f0000000340)=[{r0}], 0x1, 0x0) 03:57:59 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a09b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:57:59 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) 03:57:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{}, "b2a7252d7667f45f", "079f0000f400", "8be57d14", "a435b8f1d226a342"}, 0x28) poll(&(0x7f0000000340)=[{r0}], 0x1, 0x0) 03:58:07 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2101001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x180c026, 0x0) 03:58:07 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) 03:58:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{0x304}, "b2a7252d7667f45f", "079f0000f400", "8be57d14", "a435b8f1d226a342"}, 0x28) poll(0x0, 0x0, 0x0) 03:58:07 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a0ab76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:58:07 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488e57026408ba40bc2e5c994bdbd0d4f902fdb5be4c1e5ff5af3406ec0"], &(0x7f0000000140)=0x8) 03:58:07 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) [ 1690.828011][T32094] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 1690.843155][T32094] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:58:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{0x304}, "b2a7252d7667f45f", "079f0000f400", "8be57d14", "a435b8f1d226a342"}, 0x28) poll(0x0, 0x0, 0x0) [ 1690.910058][T32104] IPVS: ftp: loaded support on port[0] = 21 03:58:07 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) 03:58:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{0x304}, "b2a7252d7667f45f", "079f0000f400", "8be57d14", "a435b8f1d226a342"}, 0x28) poll(0x0, 0x0, 0x0) 03:58:07 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a0bb76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:58:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{0x304}, "b2a7252d7667f45f", "079f0000f400", "8be57d14", "a435b8f1d226a342"}, 0x28) poll(&(0x7f0000000340), 0x0, 0x0) 03:58:07 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, 0x0, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) 03:58:14 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd695}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) clone(0x80000, 0x0, 0x0, 0x0, 0x0) pipe(0x0) 03:58:14 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, 0x0, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) 03:58:14 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a0cb76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:58:14 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{0x304}, "b2a7252d7667f45f", "079f0000f400", "8be57d14", "a435b8f1d226a342"}, 0x28) poll(&(0x7f0000000340), 0x0, 0x0) 03:58:14 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488e57026408ba40bc2e5c994bdbd0d4f902fdb5be4c1e5ff5af3406ec0"], &(0x7f0000000140)=0x8) 03:58:14 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) 03:58:14 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{0x304}, "b2a7252d7667f45f", "079f0000f400", "8be57d14", "a435b8f1d226a342"}, 0x28) poll(&(0x7f0000000340), 0x0, 0x0) [ 1698.027775][ C0] net_ratelimit: 2 callbacks suppressed [ 1698.027782][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1698.039433][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1698.054769][T32153] IPVS: ftp: loaded support on port[0] = 21 03:58:14 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{0x304}, "b2a7252d7667f45f", "079f0000f400", "8be57d14", "a435b8f1d226a342"}, 0x28) poll(&(0x7f0000000340)=[{}], 0x1, 0x0) 03:58:14 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, 0x0, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) 03:58:14 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a0db76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:58:14 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{0x304}, "b2a7252d7667f45f", "079f0000f400", "8be57d14", "a435b8f1d226a342"}, 0x28) poll(&(0x7f0000000340)=[{}], 0x1, 0x0) [ 1698.277805][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1698.283638][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:58:14 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) 03:58:14 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{0x304}, "b2a7252d7667f45f", "079f0000f400", "8be57d14", "a435b8f1d226a342"}, 0x28) poll(&(0x7f0000000340)=[{}], 0x1, 0x0) [ 1698.747773][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1698.753640][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1698.757785][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1698.759602][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1698.765276][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1698.771525][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:58:22 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd695}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) clone(0x80000, 0x0, 0x0, 0x0, 0x0) pipe(0x0) 03:58:22 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) 03:58:22 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a0eb76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:58:22 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 03:58:22 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488e57026408ba40bc2e5c994bdbd0d4f902fdb5be4c1e5ff5af3406ec0"], &(0x7f0000000140)=0x8) 03:58:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f0000000000)=0x9, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) setsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000000140)=0x5, 0x4) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) [ 1706.563980][T32211] IPVS: ftp: loaded support on port[0] = 21 [ 1706.587795][ C1] net_ratelimit: 2 callbacks suppressed [ 1706.587801][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1706.599514][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:58:23 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) 03:58:23 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a10b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:58:23 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) 03:58:23 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a11b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:58:23 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) 03:58:23 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) [ 1707.067788][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1707.067827][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1707.076530][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1707.090029][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1707.096869][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1707.102832][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1707.109009][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:58:28 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd695}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) clone(0x80000, 0x0, 0x0, 0x0, 0x0) pipe(0x0) 03:58:28 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a12b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:58:28 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x0, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) 03:58:28 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 03:58:28 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488e57026408ba40bc2e5c994bdbd0d4f902fdb5be4c1e5ff5af3406ec0"], &(0x7f0000000140)=0x8) 03:58:28 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f0000000000)=0x9, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) setsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000000140)=0x5, 0x4) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) [ 1711.743986][T32278] IPVS: ftp: loaded support on port[0] = 21 03:58:28 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x0, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) 03:58:28 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a29b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:58:28 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x0, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) 03:58:28 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b7256d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:58:28 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) 03:58:28 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) 03:58:35 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd695}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) clone(0x80000, 0x0, 0x0, 0x0, 0x0) pipe(0x0) 03:58:35 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a255006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:58:35 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) 03:58:35 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioprio_set$uid(0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) 03:58:35 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 03:58:35 executing program 5: unshare(0x6c060000) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488e57026408ba40bc2e5c994bdbd0d4f902fdb5be4c1e5ff5af3406ec0"], &(0x7f0000000140)=0x8) [ 1719.136361][T32334] IPVS: ftp: loaded support on port[0] = 21 03:58:35 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) [ 1719.235522][ T26] audit: type=1800 audit(2000001515.600:453): pid=32339 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.2" name="bus" dev="sda1" ino=16771 res=0 03:58:35 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) 03:58:35 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a5c5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:58:35 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d2506a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:58:35 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) symlink(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)='./file0\x00') 03:58:35 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) [ 1719.547801][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1719.547835][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1719.553649][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1719.559455][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1719.570828][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1719.576619][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1719.582489][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:58:43 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd695}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) clone(0x80000, 0x0, 0x0, 0x0, 0x0) 03:58:43 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) symlink(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)='./file0\x00') 03:58:43 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5005a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:58:43 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) 03:58:43 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 03:58:43 executing program 5: unshare(0x6c060000) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488e57026408ba40bc2e5c994bdbd0d4f902fdb5be4c1e5ff5af3406ec0"], &(0x7f0000000140)=0x8) 03:58:43 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'b\x14\x90\x10_slA\x97\xdc\x8f\x00\x00\x00\x00 '}) [ 1727.465673][T32387] IPVS: ftp: loaded support on port[0] = 21 03:58:43 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) 03:58:44 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5007a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:58:44 executing program 2: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0x32) dup3(r1, r0, 0x0) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)) 03:58:44 executing program 2: r0 = socket$inet6(0xa, 0x3, 0xd) r1 = syz_open_procfs(0x0, &(0x7f00000009c0)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd0\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7\x95\xaeV\x0f\x9e\xed\x13\xc6H\v\xb7\xd0g!`\x18\x0f\x99\xadD-\xc8{\xbc\xb2\xb9Y\xe2P\x9b\xec\x1e_\xb4\x01\xf1\x1e\xa8\xf8\xdf?#p-\xbd3\"L\xe5\x7f\nC\x00}\x0eb\xbc\xa4}\x93\x9a\t\xf4\xfa\xbew D\x00\xb0Z\xc0\x1a\xf9\x924\a\x1c4\xfa\xe4\xe2\x8e\xe8\x19\x00\x05\xb7\xd51)\b\xf2#[-\xbf\x7f\x10\x14vy\x86\x85\xa4W\r\xe8i\x95\xc9\xe6\xf8\a\xd8\xe2\xdf\xc8\x97\xa2\b{b\xca\x95u:\v\x97\b\r@g\x80\x8d_\x18y\xd1\x8d\xc1)U`\xb9\xe2\xd7\x88\xc2\xaf\xdc\xc1\xda\xcc\xca\x9a\v\xact8Z\x1c\x06\x1b\xdf\xb5\xc1\"\x05,Yw\vP\xcc\xfa\xf9\x9f<\xbd\x1c\x1a\xcb*\x06\xb7\xcd\x7f\xba\xadr\xbb/\"2p\xf8\b\x1e\x04\xac*\x88\xb0\xa7\xc6\xb4M\x97n\xdck\xd1\\\x9f\x9d\x1a4 Y\xac\xcb\xf9f\xcf>qd\vn:\x12\xc0\xdca\xfd\x8d\x9dL\x92\x17\x8fe\xd1\xaa$\x12\x02R\x96t?\x9a\x1a') sendfile(r0, r1, 0x0, 0x8) [ 1727.726450][ T26] audit: type=1804 audit(2000001524.090:454): pid=32408 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir268105509/syzkaller.yPpdRi/2345/bus" dev="sda1" ino=16801 res=1 03:58:44 executing program 2: r0 = socket$inet6(0xa, 0x3, 0xd) r1 = syz_open_procfs(0x0, &(0x7f00000009c0)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd0\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7\x95\xaeV\x0f\x9e\xed\x13\xc6H\v\xb7\xd0g!`\x18\x0f\x99\xadD-\xc8{\xbc\xb2\xb9Y\xe2P\x9b\xec\x1e_\xb4\x01\xf1\x1e\xa8\xf8\xdf?#p-\xbd3\"L\xe5\x7f\nC\x00}\x0eb\xbc\xa4}\x93\x9a\t\xf4\xfa\xbew D\x00\xb0Z\xc0\x1a\xf9\x924\a\x1c4\xfa\xe4\xe2\x8e\xe8\x19\x00\x05\xb7\xd51)\b\xf2#[-\xbf\x7f\x10\x14vy\x86\x85\xa4W\r\xe8i\x95\xc9\xe6\xf8\a\xd8\xe2\xdf\xc8\x97\xa2\b{b\xca\x95u:\v\x97\b\r@g\x80\x8d_\x18y\xd1\x8d\xc1)U`\xb9\xe2\xd7\x88\xc2\xaf\xdc\xc1\xda\xcc\xca\x9a\v\xact8Z\x1c\x06\x1b\xdf\xb5\xc1\"\x05,Yw\vP\xcc\xfa\xf9\x9f<\xbd\x1c\x1a\xcb*\x06\xb7\xcd\x7f\xba\xadr\xbb/\"2p\xf8\b\x1e\x04\xac*\x88\xb0\xa7\xc6\xb4M\x97n\xdck\xd1\\\x9f\x9d\x1a4 Y\xac\xcb\xf9f\xcf>qd\vn:\x12\xc0\xdca\xfd\x8d\x9dL\x92\x17\x8fe\xd1\xaa$\x12\x02R\x96t?\x9a\x1a') sendfile(r0, r1, 0x0, 0x8) [ 1727.795601][ T26] audit: type=1804 audit(2000001524.100:455): pid=32408 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir268105509/syzkaller.yPpdRi/2345/bus" dev="sda1" ino=16801 res=1 [ 1727.867805][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1727.867846][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1727.873615][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1727.873719][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1727.892293][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1727.898568][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1727.904535][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:58:50 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd695}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) clone(0x80000, 0x0, 0x0, 0x0, 0x0) 03:58:50 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) 03:58:50 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a323617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:58:50 executing program 2: r0 = socket$inet6(0xa, 0x3, 0xd) r1 = syz_open_procfs(0x0, &(0x7f00000009c0)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd0\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7\x95\xaeV\x0f\x9e\xed\x13\xc6H\v\xb7\xd0g!`\x18\x0f\x99\xadD-\xc8{\xbc\xb2\xb9Y\xe2P\x9b\xec\x1e_\xb4\x01\xf1\x1e\xa8\xf8\xdf?#p-\xbd3\"L\xe5\x7f\nC\x00}\x0eb\xbc\xa4}\x93\x9a\t\xf4\xfa\xbew D\x00\xb0Z\xc0\x1a\xf9\x924\a\x1c4\xfa\xe4\xe2\x8e\xe8\x19\x00\x05\xb7\xd51)\b\xf2#[-\xbf\x7f\x10\x14vy\x86\x85\xa4W\r\xe8i\x95\xc9\xe6\xf8\a\xd8\xe2\xdf\xc8\x97\xa2\b{b\xca\x95u:\v\x97\b\r@g\x80\x8d_\x18y\xd1\x8d\xc1)U`\xb9\xe2\xd7\x88\xc2\xaf\xdc\xc1\xda\xcc\xca\x9a\v\xact8Z\x1c\x06\x1b\xdf\xb5\xc1\"\x05,Yw\vP\xcc\xfa\xf9\x9f<\xbd\x1c\x1a\xcb*\x06\xb7\xcd\x7f\xba\xadr\xbb/\"2p\xf8\b\x1e\x04\xac*\x88\xb0\xa7\xc6\xb4M\x97n\xdck\xd1\\\x9f\x9d\x1a4 Y\xac\xcb\xf9f\xcf>qd\vn:\x12\xc0\xdca\xfd\x8d\x9dL\x92\x17\x8fe\xd1\xaa$\x12\x02R\x96t?\x9a\x1a') sendfile(r0, r1, 0x0, 0x8) 03:58:50 executing program 5: unshare(0x6c060000) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488e57026408ba40bc2e5c994bdbd0d4f902fdb5be4c1e5ff5af3406ec0"], &(0x7f0000000140)=0x8) 03:58:50 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 03:58:50 executing program 2: r0 = socket$inet6(0xa, 0x3, 0xd) r1 = syz_open_procfs(0x0, &(0x7f00000009c0)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd0\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7\x95\xaeV\x0f\x9e\xed\x13\xc6H\v\xb7\xd0g!`\x18\x0f\x99\xadD-\xc8{\xbc\xb2\xb9Y\xe2P\x9b\xec\x1e_\xb4\x01\xf1\x1e\xa8\xf8\xdf?#p-\xbd3\"L\xe5\x7f\nC\x00}\x0eb\xbc\xa4}\x93\x9a\t\xf4\xfa\xbew D\x00\xb0Z\xc0\x1a\xf9\x924\a\x1c4\xfa\xe4\xe2\x8e\xe8\x19\x00\x05\xb7\xd51)\b\xf2#[-\xbf\x7f\x10\x14vy\x86\x85\xa4W\r\xe8i\x95\xc9\xe6\xf8\a\xd8\xe2\xdf\xc8\x97\xa2\b{b\xca\x95u:\v\x97\b\r@g\x80\x8d_\x18y\xd1\x8d\xc1)U`\xb9\xe2\xd7\x88\xc2\xaf\xdc\xc1\xda\xcc\xca\x9a\v\xact8Z\x1c\x06\x1b\xdf\xb5\xc1\"\x05,Yw\vP\xcc\xfa\xf9\x9f<\xbd\x1c\x1a\xcb*\x06\xb7\xcd\x7f\xba\xadr\xbb/\"2p\xf8\b\x1e\x04\xac*\x88\xb0\xa7\xc6\xb4M\x97n\xdck\xd1\\\x9f\x9d\x1a4 Y\xac\xcb\xf9f\xcf>qd\vn:\x12\xc0\xdca\xfd\x8d\x9dL\x92\x17\x8fe\xd1\xaa$\x12\x02R\x96t?\x9a\x1a') sendfile(r0, r1, 0x0, 0x8) [ 1734.003151][T32448] IPVS: ftp: loaded support on port[0] = 21 03:58:50 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) 03:58:50 executing program 2: r0 = socket$inet6(0xa, 0x3, 0xd) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8) 03:58:50 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a325617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) [ 1734.107775][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1734.107778][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1734.107822][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1734.113572][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1734.119362][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1734.131285][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1734.143574][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1734.149385][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:58:50 executing program 2: r0 = socket$inet6(0xa, 0x3, 0xd) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8) 03:58:50 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:58:56 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd695}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) 03:58:56 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a32a617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:58:56 executing program 2: r0 = socket$inet6(0xa, 0x3, 0xd) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8) 03:58:56 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:58:56 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 03:58:56 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488e57026408ba40bc2e5c994bdbd0d4f902fdb5be4c1e5ff5af3406ec0"], &(0x7f0000000140)=0x8) 03:58:56 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000009c0)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd0\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7\x95\xaeV\x0f\x9e\xed\x13\xc6H\v\xb7\xd0g!`\x18\x0f\x99\xadD-\xc8{\xbc\xb2\xb9Y\xe2P\x9b\xec\x1e_\xb4\x01\xf1\x1e\xa8\xf8\xdf?#p-\xbd3\"L\xe5\x7f\nC\x00}\x0eb\xbc\xa4}\x93\x9a\t\xf4\xfa\xbew D\x00\xb0Z\xc0\x1a\xf9\x924\a\x1c4\xfa\xe4\xe2\x8e\xe8\x19\x00\x05\xb7\xd51)\b\xf2#[-\xbf\x7f\x10\x14vy\x86\x85\xa4W\r\xe8i\x95\xc9\xe6\xf8\a\xd8\xe2\xdf\xc8\x97\xa2\b{b\xca\x95u:\v\x97\b\r@g\x80\x8d_\x18y\xd1\x8d\xc1)U`\xb9\xe2\xd7\x88\xc2\xaf\xdc\xc1\xda\xcc\xca\x9a\v\xact8Z\x1c\x06\x1b\xdf\xb5\xc1\"\x05,Yw\vP\xcc\xfa\xf9\x9f<\xbd\x1c\x1a\xcb*\x06\xb7\xcd\x7f\xba\xadr\xbb/\"2p\xf8\b\x1e\x04\xac*\x88\xb0\xa7\xc6\xb4M\x97n\xdck\xd1\\\x9f\x9d\x1a4 Y\xac\xcb\xf9f\xcf>qd\vn:\x12\xc0\xdca\xfd\x8d\x9dL\x92\x17\x8fe\xd1\xaa$\x12\x02R\x96t?\x9a\x1a') sendfile(0xffffffffffffffff, r0, 0x0, 0x8) [ 1740.347763][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1740.347797][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1740.353560][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1740.353656][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1740.370871][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1740.376940][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1740.382745][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:58:56 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 03:58:56 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000009c0)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd0\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7\x95\xaeV\x0f\x9e\xed\x13\xc6H\v\xb7\xd0g!`\x18\x0f\x99\xadD-\xc8{\xbc\xb2\xb9Y\xe2P\x9b\xec\x1e_\xb4\x01\xf1\x1e\xa8\xf8\xdf?#p-\xbd3\"L\xe5\x7f\nC\x00}\x0eb\xbc\xa4}\x93\x9a\t\xf4\xfa\xbew D\x00\xb0Z\xc0\x1a\xf9\x924\a\x1c4\xfa\xe4\xe2\x8e\xe8\x19\x00\x05\xb7\xd51)\b\xf2#[-\xbf\x7f\x10\x14vy\x86\x85\xa4W\r\xe8i\x95\xc9\xe6\xf8\a\xd8\xe2\xdf\xc8\x97\xa2\b{b\xca\x95u:\v\x97\b\r@g\x80\x8d_\x18y\xd1\x8d\xc1)U`\xb9\xe2\xd7\x88\xc2\xaf\xdc\xc1\xda\xcc\xca\x9a\v\xact8Z\x1c\x06\x1b\xdf\xb5\xc1\"\x05,Yw\vP\xcc\xfa\xf9\x9f<\xbd\x1c\x1a\xcb*\x06\xb7\xcd\x7f\xba\xadr\xbb/\"2p\xf8\b\x1e\x04\xac*\x88\xb0\xa7\xc6\xb4M\x97n\xdck\xd1\\\x9f\x9d\x1a4 Y\xac\xcb\xf9f\xcf>qd\vn:\x12\xc0\xdca\xfd\x8d\x9dL\x92\x17\x8fe\xd1\xaa$\x12\x02R\x96t?\x9a\x1a') sendfile(0xffffffffffffffff, r0, 0x0, 0x8) 03:58:56 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a32b617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:58:57 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000009c0)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd0\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7\x95\xaeV\x0f\x9e\xed\x13\xc6H\v\xb7\xd0g!`\x18\x0f\x99\xadD-\xc8{\xbc\xb2\xb9Y\xe2P\x9b\xec\x1e_\xb4\x01\xf1\x1e\xa8\xf8\xdf?#p-\xbd3\"L\xe5\x7f\nC\x00}\x0eb\xbc\xa4}\x93\x9a\t\xf4\xfa\xbew D\x00\xb0Z\xc0\x1a\xf9\x924\a\x1c4\xfa\xe4\xe2\x8e\xe8\x19\x00\x05\xb7\xd51)\b\xf2#[-\xbf\x7f\x10\x14vy\x86\x85\xa4W\r\xe8i\x95\xc9\xe6\xf8\a\xd8\xe2\xdf\xc8\x97\xa2\b{b\xca\x95u:\v\x97\b\r@g\x80\x8d_\x18y\xd1\x8d\xc1)U`\xb9\xe2\xd7\x88\xc2\xaf\xdc\xc1\xda\xcc\xca\x9a\v\xact8Z\x1c\x06\x1b\xdf\xb5\xc1\"\x05,Yw\vP\xcc\xfa\xf9\x9f<\xbd\x1c\x1a\xcb*\x06\xb7\xcd\x7f\xba\xadr\xbb/\"2p\xf8\b\x1e\x04\xac*\x88\xb0\xa7\xc6\xb4M\x97n\xdck\xd1\\\x9f\x9d\x1a4 Y\xac\xcb\xf9f\xcf>qd\vn:\x12\xc0\xdca\xfd\x8d\x9dL\x92\x17\x8fe\xd1\xaa$\x12\x02R\x96t?\x9a\x1a') sendfile(0xffffffffffffffff, r0, 0x0, 0x8) 03:58:57 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) 03:59:00 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd695}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:59:00 executing program 2: r0 = socket$inet6(0xa, 0x0, 0xd) r1 = syz_open_procfs(0x0, &(0x7f00000009c0)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd0\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7\x95\xaeV\x0f\x9e\xed\x13\xc6H\v\xb7\xd0g!`\x18\x0f\x99\xadD-\xc8{\xbc\xb2\xb9Y\xe2P\x9b\xec\x1e_\xb4\x01\xf1\x1e\xa8\xf8\xdf?#p-\xbd3\"L\xe5\x7f\nC\x00}\x0eb\xbc\xa4}\x93\x9a\t\xf4\xfa\xbew D\x00\xb0Z\xc0\x1a\xf9\x924\a\x1c4\xfa\xe4\xe2\x8e\xe8\x19\x00\x05\xb7\xd51)\b\xf2#[-\xbf\x7f\x10\x14vy\x86\x85\xa4W\r\xe8i\x95\xc9\xe6\xf8\a\xd8\xe2\xdf\xc8\x97\xa2\b{b\xca\x95u:\v\x97\b\r@g\x80\x8d_\x18y\xd1\x8d\xc1)U`\xb9\xe2\xd7\x88\xc2\xaf\xdc\xc1\xda\xcc\xca\x9a\v\xact8Z\x1c\x06\x1b\xdf\xb5\xc1\"\x05,Yw\vP\xcc\xfa\xf9\x9f<\xbd\x1c\x1a\xcb*\x06\xb7\xcd\x7f\xba\xadr\xbb/\"2p\xf8\b\x1e\x04\xac*\x88\xb0\xa7\xc6\xb4M\x97n\xdck\xd1\\\x9f\x9d\x1a4 Y\xac\xcb\xf9f\xcf>qd\vn:\x12\xc0\xdca\xfd\x8d\x9dL\x92\x17\x8fe\xd1\xaa$\x12\x02R\x96t?\x9a\x1a') sendfile(r0, r1, 0x0, 0x8) 03:59:00 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a32d617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:59:00 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) 03:59:00 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488e57026408ba40bc2e5c994bdbd0d4f902fdb5be4c1e5ff5af3406ec0"], &(0x7f0000000140)=0x8) 03:59:00 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 03:59:00 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) 03:59:00 executing program 2: r0 = socket$inet6(0xa, 0x0, 0xd) r1 = syz_open_procfs(0x0, &(0x7f00000009c0)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd0\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7\x95\xaeV\x0f\x9e\xed\x13\xc6H\v\xb7\xd0g!`\x18\x0f\x99\xadD-\xc8{\xbc\xb2\xb9Y\xe2P\x9b\xec\x1e_\xb4\x01\xf1\x1e\xa8\xf8\xdf?#p-\xbd3\"L\xe5\x7f\nC\x00}\x0eb\xbc\xa4}\x93\x9a\t\xf4\xfa\xbew D\x00\xb0Z\xc0\x1a\xf9\x924\a\x1c4\xfa\xe4\xe2\x8e\xe8\x19\x00\x05\xb7\xd51)\b\xf2#[-\xbf\x7f\x10\x14vy\x86\x85\xa4W\r\xe8i\x95\xc9\xe6\xf8\a\xd8\xe2\xdf\xc8\x97\xa2\b{b\xca\x95u:\v\x97\b\r@g\x80\x8d_\x18y\xd1\x8d\xc1)U`\xb9\xe2\xd7\x88\xc2\xaf\xdc\xc1\xda\xcc\xca\x9a\v\xact8Z\x1c\x06\x1b\xdf\xb5\xc1\"\x05,Yw\vP\xcc\xfa\xf9\x9f<\xbd\x1c\x1a\xcb*\x06\xb7\xcd\x7f\xba\xadr\xbb/\"2p\xf8\b\x1e\x04\xac*\x88\xb0\xa7\xc6\xb4M\x97n\xdck\xd1\\\x9f\x9d\x1a4 Y\xac\xcb\xf9f\xcf>qd\vn:\x12\xc0\xdca\xfd\x8d\x9dL\x92\x17\x8fe\xd1\xaa$\x12\x02R\x96t?\x9a\x1a') sendfile(r0, r1, 0x0, 0x8) 03:59:01 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a32e617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:59:01 executing program 2: r0 = socket$inet6(0xa, 0x0, 0xd) r1 = syz_open_procfs(0x0, &(0x7f00000009c0)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd0\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7\x95\xaeV\x0f\x9e\xed\x13\xc6H\v\xb7\xd0g!`\x18\x0f\x99\xadD-\xc8{\xbc\xb2\xb9Y\xe2P\x9b\xec\x1e_\xb4\x01\xf1\x1e\xa8\xf8\xdf?#p-\xbd3\"L\xe5\x7f\nC\x00}\x0eb\xbc\xa4}\x93\x9a\t\xf4\xfa\xbew D\x00\xb0Z\xc0\x1a\xf9\x924\a\x1c4\xfa\xe4\xe2\x8e\xe8\x19\x00\x05\xb7\xd51)\b\xf2#[-\xbf\x7f\x10\x14vy\x86\x85\xa4W\r\xe8i\x95\xc9\xe6\xf8\a\xd8\xe2\xdf\xc8\x97\xa2\b{b\xca\x95u:\v\x97\b\r@g\x80\x8d_\x18y\xd1\x8d\xc1)U`\xb9\xe2\xd7\x88\xc2\xaf\xdc\xc1\xda\xcc\xca\x9a\v\xact8Z\x1c\x06\x1b\xdf\xb5\xc1\"\x05,Yw\vP\xcc\xfa\xf9\x9f<\xbd\x1c\x1a\xcb*\x06\xb7\xcd\x7f\xba\xadr\xbb/\"2p\xf8\b\x1e\x04\xac*\x88\xb0\xa7\xc6\xb4M\x97n\xdck\xd1\\\x9f\x9d\x1a4 Y\xac\xcb\xf9f\xcf>qd\vn:\x12\xc0\xdca\xfd\x8d\x9dL\x92\x17\x8fe\xd1\xaa$\x12\x02R\x96t?\x9a\x1a') sendfile(r0, r1, 0x0, 0x8) 03:59:01 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 03:59:01 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a330617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:59:07 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:59:07 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 03:59:07 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000009c0)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd0\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7\x95\xaeV\x0f\x9e\xed\x13\xc6H\v\xb7\xd0g!`\x18\x0f\x99\xadD-\xc8{\xbc\xb2\xb9Y\xe2P\x9b\xec\x1e_\xb4\x01\xf1\x1e\xa8\xf8\xdf?#p-\xbd3\"L\xe5\x7f\nC\x00}\x0eb\xbc\xa4}\x93\x9a\t\xf4\xfa\xbew D\x00\xb0Z\xc0\x1a\xf9\x924\a\x1c4\xfa\xe4\xe2\x8e\xe8\x19\x00\x05\xb7\xd51)\b\xf2#[-\xbf\x7f\x10\x14vy\x86\x85\xa4W\r\xe8i\x95\xc9\xe6\xf8\a\xd8\xe2\xdf\xc8\x97\xa2\b{b\xca\x95u:\v\x97\b\r@g\x80\x8d_\x18y\xd1\x8d\xc1)U`\xb9\xe2\xd7\x88\xc2\xaf\xdc\xc1\xda\xcc\xca\x9a\v\xact8Z\x1c\x06\x1b\xdf\xb5\xc1\"\x05,Yw\vP\xcc\xfa\xf9\x9f<\xbd\x1c\x1a\xcb*\x06\xb7\xcd\x7f\xba\xadr\xbb/\"2p\xf8\b\x1e\x04\xac*\x88\xb0\xa7\xc6\xb4M\x97n\xdck\xd1\\\x9f\x9d\x1a4 Y\xac\xcb\xf9f\xcf>qd\vn:\x12\xc0\xdca\xfd\x8d\x9dL\x92\x17\x8fe\xd1\xaa$\x12\x02R\x96t?\x9a\x1a') sendfile(r0, r1, 0x0, 0x8) 03:59:07 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a34c617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:59:07 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 03:59:07 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488e57026408ba40bc2e5c994bdbd0d4f902fdb5be4c1e5ff5af3406ec0"], &(0x7f0000000140)=0x8) 03:59:07 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a358617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:59:07 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) 03:59:07 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000009c0)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd0\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7\x95\xaeV\x0f\x9e\xed\x13\xc6H\v\xb7\xd0g!`\x18\x0f\x99\xadD-\xc8{\xbc\xb2\xb9Y\xe2P\x9b\xec\x1e_\xb4\x01\xf1\x1e\xa8\xf8\xdf?#p-\xbd3\"L\xe5\x7f\nC\x00}\x0eb\xbc\xa4}\x93\x9a\t\xf4\xfa\xbew D\x00\xb0Z\xc0\x1a\xf9\x924\a\x1c4\xfa\xe4\xe2\x8e\xe8\x19\x00\x05\xb7\xd51)\b\xf2#[-\xbf\x7f\x10\x14vy\x86\x85\xa4W\r\xe8i\x95\xc9\xe6\xf8\a\xd8\xe2\xdf\xc8\x97\xa2\b{b\xca\x95u:\v\x97\b\r@g\x80\x8d_\x18y\xd1\x8d\xc1)U`\xb9\xe2\xd7\x88\xc2\xaf\xdc\xc1\xda\xcc\xca\x9a\v\xact8Z\x1c\x06\x1b\xdf\xb5\xc1\"\x05,Yw\vP\xcc\xfa\xf9\x9f<\xbd\x1c\x1a\xcb*\x06\xb7\xcd\x7f\xba\xadr\xbb/\"2p\xf8\b\x1e\x04\xac*\x88\xb0\xa7\xc6\xb4M\x97n\xdck\xd1\\\x9f\x9d\x1a4 Y\xac\xcb\xf9f\xcf>qd\vn:\x12\xc0\xdca\xfd\x8d\x9dL\x92\x17\x8fe\xd1\xaa$\x12\x02R\x96t?\x9a\x1a') sendfile(r0, r1, 0x0, 0x8) 03:59:07 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) 03:59:07 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000009c0)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd0\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7\x95\xaeV\x0f\x9e\xed\x13\xc6H\v\xb7\xd0g!`\x18\x0f\x99\xadD-\xc8{\xbc\xb2\xb9Y\xe2P\x9b\xec\x1e_\xb4\x01\xf1\x1e\xa8\xf8\xdf?#p-\xbd3\"L\xe5\x7f\nC\x00}\x0eb\xbc\xa4}\x93\x9a\t\xf4\xfa\xbew D\x00\xb0Z\xc0\x1a\xf9\x924\a\x1c4\xfa\xe4\xe2\x8e\xe8\x19\x00\x05\xb7\xd51)\b\xf2#[-\xbf\x7f\x10\x14vy\x86\x85\xa4W\r\xe8i\x95\xc9\xe6\xf8\a\xd8\xe2\xdf\xc8\x97\xa2\b{b\xca\x95u:\v\x97\b\r@g\x80\x8d_\x18y\xd1\x8d\xc1)U`\xb9\xe2\xd7\x88\xc2\xaf\xdc\xc1\xda\xcc\xca\x9a\v\xact8Z\x1c\x06\x1b\xdf\xb5\xc1\"\x05,Yw\vP\xcc\xfa\xf9\x9f<\xbd\x1c\x1a\xcb*\x06\xb7\xcd\x7f\xba\xadr\xbb/\"2p\xf8\b\x1e\x04\xac*\x88\xb0\xa7\xc6\xb4M\x97n\xdck\xd1\\\x9f\x9d\x1a4 Y\xac\xcb\xf9f\xcf>qd\vn:\x12\xc0\xdca\xfd\x8d\x9dL\x92\x17\x8fe\xd1\xaa$\x12\x02R\x96t?\x9a\x1a') sendfile(r0, r1, 0x0, 0x8) 03:59:07 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a363617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:59:13 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:59:13 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) 03:59:13 executing program 2: r0 = socket$inet6(0xa, 0x3, 0xd) r1 = syz_open_procfs(0x0, 0x0) sendfile(r0, r1, 0x0, 0x8) 03:59:13 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a364617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:59:13 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 03:59:13 executing program 5: unshare(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488e57026408ba40bc2e5c994bdbd0d4f902fdb5be4c1e5ff5af3406ec0"], &(0x7f0000000140)=0x8) 03:59:13 executing program 2: r0 = socket$inet6(0xa, 0x3, 0xd) r1 = syz_open_procfs(0x0, 0x0) sendfile(r0, r1, 0x0, 0x8) 03:59:13 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) 03:59:13 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a368617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:59:13 executing program 2: r0 = socket$inet6(0xa, 0x3, 0xd) r1 = syz_open_procfs(0x0, 0x0) sendfile(r0, r1, 0x0, 0x8) 03:59:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffbc, 0x18}, [@ldst={0x3, 0x0, 0x3, 0x1c10a1, 0x0, 0x48}]}, &(0x7f0000000080)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1c0}, 0x48) 03:59:13 executing program 2: socket$inet6(0xa, 0x3, 0xd) r0 = syz_open_procfs(0x0, &(0x7f00000009c0)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd0\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7\x95\xaeV\x0f\x9e\xed\x13\xc6H\v\xb7\xd0g!`\x18\x0f\x99\xadD-\xc8{\xbc\xb2\xb9Y\xe2P\x9b\xec\x1e_\xb4\x01\xf1\x1e\xa8\xf8\xdf?#p-\xbd3\"L\xe5\x7f\nC\x00}\x0eb\xbc\xa4}\x93\x9a\t\xf4\xfa\xbew D\x00\xb0Z\xc0\x1a\xf9\x924\a\x1c4\xfa\xe4\xe2\x8e\xe8\x19\x00\x05\xb7\xd51)\b\xf2#[-\xbf\x7f\x10\x14vy\x86\x85\xa4W\r\xe8i\x95\xc9\xe6\xf8\a\xd8\xe2\xdf\xc8\x97\xa2\b{b\xca\x95u:\v\x97\b\r@g\x80\x8d_\x18y\xd1\x8d\xc1)U`\xb9\xe2\xd7\x88\xc2\xaf\xdc\xc1\xda\xcc\xca\x9a\v\xact8Z\x1c\x06\x1b\xdf\xb5\xc1\"\x05,Yw\vP\xcc\xfa\xf9\x9f<\xbd\x1c\x1a\xcb*\x06\xb7\xcd\x7f\xba\xadr\xbb/\"2p\xf8\b\x1e\x04\xac*\x88\xb0\xa7\xc6\xb4M\x97n\xdck\xd1\\\x9f\x9d\x1a4 Y\xac\xcb\xf9f\xcf>qd\vn:\x12\xc0\xdca\xfd\x8d\x9dL\x92\x17\x8fe\xd1\xaa$\x12\x02R\x96t?\x9a\x1a') sendfile(0xffffffffffffffff, r0, 0x0, 0x8) 03:59:19 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:59:19 executing program 3: r0 = socket(0x100000400000010, 0x2, 0x0) write(r0, &(0x7f0000000280)="2400000052001f0214f9f4070109040002000710000601000100000008009437c56e0000", 0x307) 03:59:19 executing program 2: socket$inet6(0xa, 0x3, 0xd) r0 = syz_open_procfs(0x0, &(0x7f00000009c0)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd0\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7\x95\xaeV\x0f\x9e\xed\x13\xc6H\v\xb7\xd0g!`\x18\x0f\x99\xadD-\xc8{\xbc\xb2\xb9Y\xe2P\x9b\xec\x1e_\xb4\x01\xf1\x1e\xa8\xf8\xdf?#p-\xbd3\"L\xe5\x7f\nC\x00}\x0eb\xbc\xa4}\x93\x9a\t\xf4\xfa\xbew D\x00\xb0Z\xc0\x1a\xf9\x924\a\x1c4\xfa\xe4\xe2\x8e\xe8\x19\x00\x05\xb7\xd51)\b\xf2#[-\xbf\x7f\x10\x14vy\x86\x85\xa4W\r\xe8i\x95\xc9\xe6\xf8\a\xd8\xe2\xdf\xc8\x97\xa2\b{b\xca\x95u:\v\x97\b\r@g\x80\x8d_\x18y\xd1\x8d\xc1)U`\xb9\xe2\xd7\x88\xc2\xaf\xdc\xc1\xda\xcc\xca\x9a\v\xact8Z\x1c\x06\x1b\xdf\xb5\xc1\"\x05,Yw\vP\xcc\xfa\xf9\x9f<\xbd\x1c\x1a\xcb*\x06\xb7\xcd\x7f\xba\xadr\xbb/\"2p\xf8\b\x1e\x04\xac*\x88\xb0\xa7\xc6\xb4M\x97n\xdck\xd1\\\x9f\x9d\x1a4 Y\xac\xcb\xf9f\xcf>qd\vn:\x12\xc0\xdca\xfd\x8d\x9dL\x92\x17\x8fe\xd1\xaa$\x12\x02R\x96t?\x9a\x1a') sendfile(0xffffffffffffffff, r0, 0x0, 0x8) 03:59:19 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r1, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x30005, 0x0) 03:59:19 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a369617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:59:19 executing program 5: unshare(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488e57026408ba40bc2e5c994bdbd0d4f902fdb5be4c1e5ff5af3406ec0"], &(0x7f0000000140)=0x8) 03:59:19 executing program 2: socket$inet6(0xa, 0x3, 0xd) r0 = syz_open_procfs(0x0, &(0x7f00000009c0)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd0\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7\x95\xaeV\x0f\x9e\xed\x13\xc6H\v\xb7\xd0g!`\x18\x0f\x99\xadD-\xc8{\xbc\xb2\xb9Y\xe2P\x9b\xec\x1e_\xb4\x01\xf1\x1e\xa8\xf8\xdf?#p-\xbd3\"L\xe5\x7f\nC\x00}\x0eb\xbc\xa4}\x93\x9a\t\xf4\xfa\xbew D\x00\xb0Z\xc0\x1a\xf9\x924\a\x1c4\xfa\xe4\xe2\x8e\xe8\x19\x00\x05\xb7\xd51)\b\xf2#[-\xbf\x7f\x10\x14vy\x86\x85\xa4W\r\xe8i\x95\xc9\xe6\xf8\a\xd8\xe2\xdf\xc8\x97\xa2\b{b\xca\x95u:\v\x97\b\r@g\x80\x8d_\x18y\xd1\x8d\xc1)U`\xb9\xe2\xd7\x88\xc2\xaf\xdc\xc1\xda\xcc\xca\x9a\v\xact8Z\x1c\x06\x1b\xdf\xb5\xc1\"\x05,Yw\vP\xcc\xfa\xf9\x9f<\xbd\x1c\x1a\xcb*\x06\xb7\xcd\x7f\xba\xadr\xbb/\"2p\xf8\b\x1e\x04\xac*\x88\xb0\xa7\xc6\xb4M\x97n\xdck\xd1\\\x9f\x9d\x1a4 Y\xac\xcb\xf9f\xcf>qd\vn:\x12\xc0\xdca\xfd\x8d\x9dL\x92\x17\x8fe\xd1\xaa$\x12\x02R\x96t?\x9a\x1a') sendfile(0xffffffffffffffff, r0, 0x0, 0x8) 03:59:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) 03:59:19 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r1, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x30005, 0x0) 03:59:19 executing program 2: r0 = socket$inet6(0xa, 0x3, 0xd) syz_open_procfs(0x0, &(0x7f00000009c0)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd0\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7\x95\xaeV\x0f\x9e\xed\x13\xc6H\v\xb7\xd0g!`\x18\x0f\x99\xadD-\xc8{\xbc\xb2\xb9Y\xe2P\x9b\xec\x1e_\xb4\x01\xf1\x1e\xa8\xf8\xdf?#p-\xbd3\"L\xe5\x7f\nC\x00}\x0eb\xbc\xa4}\x93\x9a\t\xf4\xfa\xbew D\x00\xb0Z\xc0\x1a\xf9\x924\a\x1c4\xfa\xe4\xe2\x8e\xe8\x19\x00\x05\xb7\xd51)\b\xf2#[-\xbf\x7f\x10\x14vy\x86\x85\xa4W\r\xe8i\x95\xc9\xe6\xf8\a\xd8\xe2\xdf\xc8\x97\xa2\b{b\xca\x95u:\v\x97\b\r@g\x80\x8d_\x18y\xd1\x8d\xc1)U`\xb9\xe2\xd7\x88\xc2\xaf\xdc\xc1\xda\xcc\xca\x9a\v\xact8Z\x1c\x06\x1b\xdf\xb5\xc1\"\x05,Yw\vP\xcc\xfa\xf9\x9f<\xbd\x1c\x1a\xcb*\x06\xb7\xcd\x7f\xba\xadr\xbb/\"2p\xf8\b\x1e\x04\xac*\x88\xb0\xa7\xc6\xb4M\x97n\xdck\xd1\\\x9f\x9d\x1a4 Y\xac\xcb\xf9f\xcf>qd\vn:\x12\xc0\xdca\xfd\x8d\x9dL\x92\x17\x8fe\xd1\xaa$\x12\x02R\x96t?\x9a\x1a') sendfile(r0, 0xffffffffffffffff, 0x0, 0x8) 03:59:19 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a36c617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:59:19 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r1, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x30005, 0x0) 03:59:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) 03:59:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) 03:59:23 executing program 2: r0 = socket$inet6(0xa, 0x3, 0xd) syz_open_procfs(0x0, &(0x7f00000009c0)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd0\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7\x95\xaeV\x0f\x9e\xed\x13\xc6H\v\xb7\xd0g!`\x18\x0f\x99\xadD-\xc8{\xbc\xb2\xb9Y\xe2P\x9b\xec\x1e_\xb4\x01\xf1\x1e\xa8\xf8\xdf?#p-\xbd3\"L\xe5\x7f\nC\x00}\x0eb\xbc\xa4}\x93\x9a\t\xf4\xfa\xbew D\x00\xb0Z\xc0\x1a\xf9\x924\a\x1c4\xfa\xe4\xe2\x8e\xe8\x19\x00\x05\xb7\xd51)\b\xf2#[-\xbf\x7f\x10\x14vy\x86\x85\xa4W\r\xe8i\x95\xc9\xe6\xf8\a\xd8\xe2\xdf\xc8\x97\xa2\b{b\xca\x95u:\v\x97\b\r@g\x80\x8d_\x18y\xd1\x8d\xc1)U`\xb9\xe2\xd7\x88\xc2\xaf\xdc\xc1\xda\xcc\xca\x9a\v\xact8Z\x1c\x06\x1b\xdf\xb5\xc1\"\x05,Yw\vP\xcc\xfa\xf9\x9f<\xbd\x1c\x1a\xcb*\x06\xb7\xcd\x7f\xba\xadr\xbb/\"2p\xf8\b\x1e\x04\xac*\x88\xb0\xa7\xc6\xb4M\x97n\xdck\xd1\\\x9f\x9d\x1a4 Y\xac\xcb\xf9f\xcf>qd\vn:\x12\xc0\xdca\xfd\x8d\x9dL\x92\x17\x8fe\xd1\xaa$\x12\x02R\x96t?\x9a\x1a') sendfile(r0, 0xffffffffffffffff, 0x0, 0x8) 03:59:23 executing program 4: pipe(0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r1, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x30005, 0x0) 03:59:23 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd695}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:59:23 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a36f617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:59:23 executing program 5: unshare(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488e57026408ba40bc2e5c994bdbd0d4f902fdb5be4c1e5ff5af3406ec0"], &(0x7f0000000140)=0x8) 03:59:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) 03:59:23 executing program 2: r0 = socket$inet6(0xa, 0x3, 0xd) syz_open_procfs(0x0, &(0x7f00000009c0)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd0\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7\x95\xaeV\x0f\x9e\xed\x13\xc6H\v\xb7\xd0g!`\x18\x0f\x99\xadD-\xc8{\xbc\xb2\xb9Y\xe2P\x9b\xec\x1e_\xb4\x01\xf1\x1e\xa8\xf8\xdf?#p-\xbd3\"L\xe5\x7f\nC\x00}\x0eb\xbc\xa4}\x93\x9a\t\xf4\xfa\xbew D\x00\xb0Z\xc0\x1a\xf9\x924\a\x1c4\xfa\xe4\xe2\x8e\xe8\x19\x00\x05\xb7\xd51)\b\xf2#[-\xbf\x7f\x10\x14vy\x86\x85\xa4W\r\xe8i\x95\xc9\xe6\xf8\a\xd8\xe2\xdf\xc8\x97\xa2\b{b\xca\x95u:\v\x97\b\r@g\x80\x8d_\x18y\xd1\x8d\xc1)U`\xb9\xe2\xd7\x88\xc2\xaf\xdc\xc1\xda\xcc\xca\x9a\v\xact8Z\x1c\x06\x1b\xdf\xb5\xc1\"\x05,Yw\vP\xcc\xfa\xf9\x9f<\xbd\x1c\x1a\xcb*\x06\xb7\xcd\x7f\xba\xadr\xbb/\"2p\xf8\b\x1e\x04\xac*\x88\xb0\xa7\xc6\xb4M\x97n\xdck\xd1\\\x9f\x9d\x1a4 Y\xac\xcb\xf9f\xcf>qd\vn:\x12\xc0\xdca\xfd\x8d\x9dL\x92\x17\x8fe\xd1\xaa$\x12\x02R\x96t?\x9a\x1a') sendfile(r0, 0xffffffffffffffff, 0x0, 0x8) 03:59:23 executing program 4: pipe(0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r1, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x30005, 0x0) 03:59:24 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a370617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:59:24 executing program 2: r0 = socket$inet6(0xa, 0x3, 0xd) r1 = syz_open_procfs(0x0, &(0x7f00000009c0)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd0\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7\x95\xaeV\x0f\x9e\xed\x13\xc6H\v\xb7\xd0g!`\x18\x0f\x99\xadD-\xc8{\xbc\xb2\xb9Y\xe2P\x9b\xec\x1e_\xb4\x01\xf1\x1e\xa8\xf8\xdf?#p-\xbd3\"L\xe5\x7f\nC\x00}\x0eb\xbc\xa4}\x93\x9a\t\xf4\xfa\xbew D\x00\xb0Z\xc0\x1a\xf9\x924\a\x1c4\xfa\xe4\xe2\x8e\xe8\x19\x00\x05\xb7\xd51)\b\xf2#[-\xbf\x7f\x10\x14vy\x86\x85\xa4W\r\xe8i\x95\xc9\xe6\xf8\a\xd8\xe2\xdf\xc8\x97\xa2\b{b\xca\x95u:\v\x97\b\r@g\x80\x8d_\x18y\xd1\x8d\xc1)U`\xb9\xe2\xd7\x88\xc2\xaf\xdc\xc1\xda\xcc\xca\x9a\v\xact8Z\x1c\x06\x1b\xdf\xb5\xc1\"\x05,Yw\vP\xcc\xfa\xf9\x9f<\xbd\x1c\x1a\xcb*\x06\xb7\xcd\x7f\xba\xadr\xbb/\"2p\xf8\b\x1e\x04\xac*\x88\xb0\xa7\xc6\xb4M\x97n\xdck\xd1\\\x9f\x9d\x1a4 Y\xac\xcb\xf9f\xcf>qd\vn:\x12\xc0\xdca\xfd\x8d\x9dL\x92\x17\x8fe\xd1\xaa$\x12\x02R\x96t?\x9a\x1a') sendfile(r0, r1, 0x0, 0x0) 03:59:24 executing program 4: pipe(0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r1, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x30005, 0x0) 03:59:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) 03:59:24 executing program 2: r0 = socket$inet6(0xa, 0x3, 0xd) r1 = syz_open_procfs(0x0, &(0x7f00000009c0)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd0\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7\x95\xaeV\x0f\x9e\xed\x13\xc6H\v\xb7\xd0g!`\x18\x0f\x99\xadD-\xc8{\xbc\xb2\xb9Y\xe2P\x9b\xec\x1e_\xb4\x01\xf1\x1e\xa8\xf8\xdf?#p-\xbd3\"L\xe5\x7f\nC\x00}\x0eb\xbc\xa4}\x93\x9a\t\xf4\xfa\xbew D\x00\xb0Z\xc0\x1a\xf9\x924\a\x1c4\xfa\xe4\xe2\x8e\xe8\x19\x00\x05\xb7\xd51)\b\xf2#[-\xbf\x7f\x10\x14vy\x86\x85\xa4W\r\xe8i\x95\xc9\xe6\xf8\a\xd8\xe2\xdf\xc8\x97\xa2\b{b\xca\x95u:\v\x97\b\r@g\x80\x8d_\x18y\xd1\x8d\xc1)U`\xb9\xe2\xd7\x88\xc2\xaf\xdc\xc1\xda\xcc\xca\x9a\v\xact8Z\x1c\x06\x1b\xdf\xb5\xc1\"\x05,Yw\vP\xcc\xfa\xf9\x9f<\xbd\x1c\x1a\xcb*\x06\xb7\xcd\x7f\xba\xadr\xbb/\"2p\xf8\b\x1e\x04\xac*\x88\xb0\xa7\xc6\xb4M\x97n\xdck\xd1\\\x9f\x9d\x1a4 Y\xac\xcb\xf9f\xcf>qd\vn:\x12\xc0\xdca\xfd\x8d\x9dL\x92\x17\x8fe\xd1\xaa$\x12\x02R\x96t?\x9a\x1a') sendfile(r0, r1, 0x0, 0x0) 03:59:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) 03:59:30 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd695}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:59:30 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 03:59:30 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a373617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:59:30 executing program 2: r0 = socket$inet6(0xa, 0x3, 0xd) r1 = syz_open_procfs(0x0, &(0x7f00000009c0)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd0\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7\x95\xaeV\x0f\x9e\xed\x13\xc6H\v\xb7\xd0g!`\x18\x0f\x99\xadD-\xc8{\xbc\xb2\xb9Y\xe2P\x9b\xec\x1e_\xb4\x01\xf1\x1e\xa8\xf8\xdf?#p-\xbd3\"L\xe5\x7f\nC\x00}\x0eb\xbc\xa4}\x93\x9a\t\xf4\xfa\xbew D\x00\xb0Z\xc0\x1a\xf9\x924\a\x1c4\xfa\xe4\xe2\x8e\xe8\x19\x00\x05\xb7\xd51)\b\xf2#[-\xbf\x7f\x10\x14vy\x86\x85\xa4W\r\xe8i\x95\xc9\xe6\xf8\a\xd8\xe2\xdf\xc8\x97\xa2\b{b\xca\x95u:\v\x97\b\r@g\x80\x8d_\x18y\xd1\x8d\xc1)U`\xb9\xe2\xd7\x88\xc2\xaf\xdc\xc1\xda\xcc\xca\x9a\v\xact8Z\x1c\x06\x1b\xdf\xb5\xc1\"\x05,Yw\vP\xcc\xfa\xf9\x9f<\xbd\x1c\x1a\xcb*\x06\xb7\xcd\x7f\xba\xadr\xbb/\"2p\xf8\b\x1e\x04\xac*\x88\xb0\xa7\xc6\xb4M\x97n\xdck\xd1\\\x9f\x9d\x1a4 Y\xac\xcb\xf9f\xcf>qd\vn:\x12\xc0\xdca\xfd\x8d\x9dL\x92\x17\x8fe\xd1\xaa$\x12\x02R\x96t?\x9a\x1a') sendfile(r0, r1, 0x0, 0x0) 03:59:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) 03:59:30 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488e57026408ba40bc2e5c994bdbd0d4f902fdb5be4c1e5ff5af3406ec0"], &(0x7f0000000140)=0x8) [ 1773.673219][ T400] IPVS: ftp: loaded support on port[0] = 21 03:59:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) 03:59:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) 03:59:30 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a374617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:59:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") unshare(0x6c060000) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) 03:59:30 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488e57026408ba40bc2e5c994bdbd0d4f902fdb5be4c1e5ff5af3406ec0"], &(0x7f0000000140)=0x8) 03:59:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) [ 1774.029429][ T427] IPVS: ftp: loaded support on port[0] = 21 [ 1774.038117][ T428] IPVS: ftp: loaded support on port[0] = 21 [ 1774.219008][ T434] IPVS: ftp: loaded support on port[0] = 21 03:59:34 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd695}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:59:34 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a378617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:59:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) 03:59:34 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488e57026408ba40bc2e5c994bdbd0d4f902fdb5be4c1e5ff5af3406ec0"], &(0x7f0000000140)=0x8) 03:59:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") unshare(0x6c060000) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) 03:59:34 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 03:59:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) [ 1777.916182][ T454] IPVS: ftp: loaded support on port[0] = 21 [ 1777.927048][ T456] IPVS: ftp: loaded support on port[0] = 21 03:59:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) 03:59:34 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a37a617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:59:34 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488e57026408ba40bc2e5c994bdbd0d4f902fdb5be4c1e5ff5af3406ec0"], &(0x7f0000000140)=0x8) 03:59:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") unshare(0x6c060000) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) 03:59:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) [ 1778.290290][ T487] IPVS: ftp: loaded support on port[0] = 21 [ 1778.301207][ T486] IPVS: ftp: loaded support on port[0] = 21 03:59:40 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd695}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:59:40 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375257f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:59:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) 03:59:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") unshare(0x6c060000) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) 03:59:40 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 03:59:40 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488e57026408ba40bc2e5c994bdbd0d4f902fdb5be4c1e5ff5af3406ec0"], &(0x7f0000000140)=0x8) 03:59:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) [ 1784.155010][ T514] IPVS: ftp: loaded support on port[0] = 21 [ 1784.172332][ T516] IPVS: ftp: loaded support on port[0] = 21 03:59:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) 03:59:40 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a3755c7f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:59:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) 03:59:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) 03:59:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") unshare(0x6c060000) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) [ 1784.606177][ T552] IPVS: ftp: loaded support on port[0] = 21 03:59:44 executing program 0: open(0x0, 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd695}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:59:44 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a5c609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:59:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) 03:59:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") unshare(0x6c060000) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) 03:59:44 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 03:59:44 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488e57026408ba40bc2e5c994bdbd0d4f902fdb5be4c1e5ff5af3406ec0"], &(0x7f0000000140)=0x8) 03:59:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) [ 1788.426153][ T569] IPVS: ftp: loaded support on port[0] = 21 [ 1788.435446][ T571] IPVS: ftp: loaded support on port[0] = 21 03:59:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) 03:59:45 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76149a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:59:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) 03:59:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") unshare(0x6c060000) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) 03:59:45 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a02b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) [ 1788.815576][ T602] IPVS: ftp: loaded support on port[0] = 21 03:59:50 executing program 0: open(0x0, 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd695}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:59:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) 03:59:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") unshare(0x6c060000) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) 03:59:50 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a03b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:59:50 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x0, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488e57026408ba40bc2e5c994bdbd0d4f902fdb5be4c1e5ff5af3406ec0"], &(0x7f0000000140)=0x8) 03:59:50 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 03:59:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) [ 1794.626839][ T633] IPVS: ftp: loaded support on port[0] = 21 [ 1794.652010][ T634] IPVS: ftp: loaded support on port[0] = 21 03:59:51 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a05b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:59:51 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) 03:59:51 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) 03:59:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") unshare(0x6c060000) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) 03:59:51 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a06b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) [ 1795.062873][ T664] IPVS: ftp: loaded support on port[0] = 21 03:59:55 executing program 0: open(0x0, 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd695}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:59:55 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) 03:59:55 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a07b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:59:55 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x0, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488e57026408ba40bc2e5c994bdbd0d4f902fdb5be4c1e5ff5af3406ec0"], &(0x7f0000000140)=0x8) 03:59:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") unshare(0x6c060000) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) 03:59:55 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 03:59:55 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) [ 1798.880663][ T700] IPVS: ftp: loaded support on port[0] = 21 [ 1798.898127][ T693] IPVS: ftp: loaded support on port[0] = 21 03:59:55 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a08b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 03:59:55 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) 03:59:55 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) 03:59:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) 03:59:55 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) 04:00:01 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd695}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:00:01 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a09b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:00:01 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) 04:00:01 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) 04:00:01 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x0, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488e57026408ba40bc2e5c994bdbd0d4f902fdb5be4c1e5ff5af3406ec0"], &(0x7f0000000140)=0x8) 04:00:01 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 04:00:01 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) 04:00:01 executing program 2: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) [ 1805.115705][ T754] IPVS: ftp: loaded support on port[0] = 21 04:00:01 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) 04:00:01 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a0ab690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:00:01 executing program 2: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) 04:00:01 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) 04:00:07 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd695}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:00:07 executing program 2: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) 04:00:07 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a0bb690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:00:07 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) 04:00:07 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488e57026408ba40bc2e5c994bdbd0d4f902fdb5be4c1e5ff5af3406ec0"], &(0x7f0000000140)=0x8) 04:00:07 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 04:00:07 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) 04:00:07 executing program 2: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) [ 1811.443272][ T801] IPVS: ftp: loaded support on port[0] = 21 04:00:07 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) 04:00:07 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a0cb690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:00:07 executing program 2: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) 04:00:08 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) 04:00:11 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd695}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:00:11 executing program 2: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) 04:00:11 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) 04:00:11 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a0db690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:00:11 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488e57026408ba40bc2e5c994bdbd0d4f902fdb5be4c1e5ff5af3406ec0"], &(0x7f0000000140)=0x8) 04:00:11 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 04:00:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) 04:00:12 executing program 2: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) [ 1815.615998][ T852] IPVS: ftp: loaded support on port[0] = 21 04:00:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) 04:00:12 executing program 2: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) 04:00:12 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a0eb690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:00:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) 04:00:16 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a10b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:00:16 executing program 2: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) 04:00:16 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:00:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d0400", 0xc) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) 04:00:16 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488e57026408ba40bc2e5c994bdbd0d4f902fdb5be4c1e5ff5af3406ec0"], &(0x7f0000000140)=0x8) 04:00:16 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000), 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 04:00:16 executing program 2: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) 04:00:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d0400", 0xc) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) [ 1819.842856][ T908] IPVS: ftp: loaded support on port[0] = 21 04:00:16 executing program 2: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x41, 0x0, &(0x7f0000001000)) 04:00:16 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a11b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:00:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d0400", 0xc) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) 04:00:16 executing program 2: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x41, 0x0, &(0x7f0000001000)) 04:00:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000", 0xe) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) 04:00:16 executing program 2: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x41, 0x0, &(0x7f0000001000)) 04:00:16 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a12b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:00:21 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:00:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000", 0xe) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) 04:00:21 executing program 2: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x41, &(0x7f0000000000)=""/40, 0x0) 04:00:21 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488e57026408ba40bc2e5c994bdbd0d4f902fdb5be4c1e5ff5af3406ec0"], &(0x7f0000000140)=0x8) 04:00:21 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf259ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:00:21 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000), 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 04:00:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000", 0xe) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) 04:00:21 executing program 2: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x41, &(0x7f0000000000)=""/40, 0x0) [ 1824.940960][ T978] IPVS: ftp: loaded support on port[0] = 21 04:00:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d0400000028", 0xf) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) 04:00:21 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf309ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:00:21 executing program 2: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x41, &(0x7f0000000000)=""/40, 0x0) 04:00:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d0400000028", 0xf) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) [ 1825.147827][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1825.153693][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1825.627830][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1825.627850][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1825.633664][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1825.639402][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1825.645169][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1825.656785][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1825.663403][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1825.669204][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:00:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") unshare(0x6c060000) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) 04:00:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d0400000028", 0xf) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) 04:00:27 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf319ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:00:27 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:00:27 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488e57026408ba40bc2e5c994bdbd0d4f902fdb5be4c1e5ff5af3406ec0"], &(0x7f0000000140)=0x8) 04:00:27 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000), 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 04:00:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) [ 1831.104189][ T1028] IPVS: ftp: loaded support on port[0] = 21 04:00:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) [ 1831.147760][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1831.154341][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1831.167899][ T1030] IPVS: ftp: loaded support on port[0] = 21 04:00:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) 04:00:27 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf329ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:00:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) [ 1831.387781][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1831.393758][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:00:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) 04:00:27 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r3 = socket$inet6(0xa, 0x802, 0x0) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) 04:00:28 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf339ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:00:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) [ 1831.867769][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1831.867798][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1831.873589][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1831.885412][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1831.891214][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:00:31 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd695}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:00:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) 04:00:31 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf349ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:00:31 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488e57026408ba40bc2e5c994bdbd0d4f902fdb5be4c1e5ff5af3406ec0"], &(0x7f0000000140)=0x8) 04:00:31 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 04:00:31 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp6\x00') preadv(r0, &(0x7f0000000300)=[{&(0x7f0000000040)=""/235, 0x33}], 0x1, 0x5e) 04:00:31 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvmmsg(r0, &(0x7f0000005b80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 04:00:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) [ 1835.294638][ T1108] IPVS: ftp: loaded support on port[0] = 21 [ 1835.307762][ C0] protocol 88fb is buggy, dev hsr_slave_0 04:00:31 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf359ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:00:31 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:00:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) 04:00:32 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf369ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:00:37 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd695}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:00:37 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440), 0x0, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) 04:00:37 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:00:37 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf639ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:00:37 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488e57026408ba40bc2e5c994bdbd0d4f902fdb5be4c1e5ff5af3406ec0"], &(0x7f0000000140)=0x8) 04:00:37 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 04:00:37 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440), 0x0, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) [ 1841.526782][ T1174] IPVS: ftp: loaded support on port[0] = 21 [ 1841.547768][ C0] net_ratelimit: 11 callbacks suppressed [ 1841.547775][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1841.560070][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:00:38 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba29263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:00:38 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440), 0x0, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) 04:00:38 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:00:38 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) [ 1841.787776][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1841.793662][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:00:38 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba5e263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) [ 1842.267768][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1842.273620][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1842.277744][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1842.285415][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1842.293311][ C1] protocol 88fb is buggy, dev hsr_slave_0 04:00:42 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd695}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:00:42 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) 04:00:42 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:00:42 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18262f18940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:00:42 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 04:00:42 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488e57026408ba40bc2e5c994bdbd0d4f902fdb5be4c1e5ff5af3406ec0"], &(0x7f0000000140)=0x8) 04:00:42 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) [ 1845.695122][ T1233] IPVS: ftp: loaded support on port[0] = 21 [ 1845.707867][ C0] protocol 88fb is buggy, dev hsr_slave_0 04:00:42 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18265c18940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:00:42 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) 04:00:42 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:00:42 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) 04:00:42 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263129940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:00:48 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) 04:00:48 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:00:48 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba1826315e940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:00:48 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488e57026408ba40bc2e5c994bdbd0d4f902fdb5be4c1e5ff5af3406ec0"], &(0x7f0000000140)=0x8) 04:00:48 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:00:48 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 04:00:48 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) [ 1851.906698][ T1294] IPVS: ftp: loaded support on port[0] = 21 [ 1851.957769][ C0] net_ratelimit: 11 callbacks suppressed [ 1851.957775][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1851.969835][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:00:48 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:00:48 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) 04:00:48 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118945e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) [ 1852.187772][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1852.193775][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:00:48 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:00:48 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) 04:00:48 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) 04:00:48 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e5c48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:00:48 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1852.667798][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1852.667833][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1852.674341][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1852.680090][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1852.692332][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:00:54 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:00:54 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) 04:00:54 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f25d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:00:54 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:00:54 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 04:00:54 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, 0x0, &(0x7f0000000140)) [ 1858.186756][ T1373] IPVS: ftp: loaded support on port[0] = 21 04:00:54 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0xffffffffffffffb7, &(0x7f0000000140)=[{&(0x7f0000002780)=""/4096, 0x20001e80}], 0x1}}], 0x213, 0x0, 0x0) 04:00:54 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:00:54 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f5ed6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:00:54 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) [ 1858.427826][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1858.433731][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:00:54 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:00:54 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) [ 1858.907792][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1858.907826][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1858.913805][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1858.919539][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1858.925482][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1858.936859][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1858.942712][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1858.948458][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:01:00 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:01:00 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc1c0522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:01:00 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:01:00 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 04:01:00 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, 0x0, &(0x7f0000000140)) 04:01:00 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 04:01:00 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040), 0x0, 0x0, 0x0) [ 1864.427754][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1864.433592][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1864.452106][ T1434] IPVS: ftp: loaded support on port[0] = 21 04:01:00 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124252d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:01:01 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040), 0x0, 0x0, 0x0) 04:01:01 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1864.667794][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1864.675321][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:01:01 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040), 0x0, 0x0, 0x0) 04:01:01 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:01:01 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc1245e2d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:01:01 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 04:01:01 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1865.147779][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1865.147813][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1865.153630][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1865.165169][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1865.171018][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1865.176811][ C1] protocol 88fb is buggy, dev hsr_slave_0 04:01:07 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 04:01:07 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc12452083eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:01:07 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd695, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:01:07 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x0, 0x0}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 04:01:07 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:01:07 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, 0x0, &(0x7f0000000140)) 04:01:07 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 1870.785382][ T1508] IPVS: ftp: loaded support on port[0] = 21 04:01:07 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:01:07 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124525c3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) [ 1870.907876][ C1] net_ratelimit: 1 callbacks suppressed [ 1870.907882][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1870.919284][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:01:07 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f0000000140)}}], 0x1, 0x0, 0x0) 04:01:07 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:01:07 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f0000000140)}}], 0x1, 0x0, 0x0) 04:01:07 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f0000000140)}}], 0x1, 0x0, 0x0) 04:01:07 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0294016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) [ 1871.387747][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1871.393609][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1871.397723][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1871.399414][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1871.405046][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1871.410768][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1871.422247][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1871.428023][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:01:13 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 04:01:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 04:01:13 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0394016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:01:13 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd695, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:01:13 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x0, 0x0}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 04:01:13 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) 04:01:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) [ 1877.103742][ T1577] IPVS: ftp: loaded support on port[0] = 21 04:01:13 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 1877.147837][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1877.153712][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:01:13 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0494016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:01:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 04:01:13 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 04:01:13 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0xfffffff5) accept$alg(0xffffffffffffffff, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) signalfd(0xffffffffffffffff, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xcc) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 04:01:13 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:01:13 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0xfffffff5) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, 0x0) signalfd(0xffffffffffffffff, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xcc) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 04:01:13 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0594016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) [ 1877.627766][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1877.627769][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1877.627852][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1877.633720][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1877.639487][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1877.656610][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1877.662571][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1877.668387][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:01:18 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd695, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:01:18 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) accept$alg(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000001c0)={0x10000}, 0x8) openat$capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xcc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 04:01:18 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0694016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:01:18 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:01:18 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x0, 0x0}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 04:01:18 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) [ 1882.140765][ T1657] IPVS: ftp: loaded support on port[0] = 21 04:01:18 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:01:18 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0894016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:01:18 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:01:18 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0a94016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:01:18 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0b94016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:01:19 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:01:19 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) accept$alg(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000001c0)={0x10000}, 0x8) openat$capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xcc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 04:01:24 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd695}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:01:24 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0c94016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:01:24 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:01:24 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 04:01:24 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)=0x1) 04:01:24 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0xfffffff5) accept$alg(0xffffffffffffffff, 0x0, 0x0) openat$capi20(0xffffffffffffff9c, &(0x7f0000000100)='/dev/capi20\x00', 0x0, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xcc) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_REQBUFS(r3, 0xc0145608, &(0x7f0000000000)={0x0, 0x2, 0x1}) ioctl$VIDIOC_DBG_G_REGISTER(r3, 0xc0385650, &(0x7f0000000000)={{0x3, @name="9017d0ed071df3233d3dbe12c7f38e7a330b8f737ff63a5930248bf4d052b675"}, 0x8, 0x9, 0x8000}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, 0xffffffffffffffff) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, &(0x7f0000000280)={0x1, 0xb, 0x1, 0x10, 0x4, 0x7fff, 0xb}) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) [ 1888.333792][ T1730] IPVS: ftp: loaded support on port[0] = 21 04:01:24 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) 04:01:24 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0f94016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:01:25 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) 04:01:25 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b2594016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:01:25 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) 04:01:25 executing program 2: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 04:01:29 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd695}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:01:29 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194026558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:01:29 executing program 2: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 04:01:29 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0xfffffff5) accept$alg(0xffffffffffffffff, 0x0, 0x0) openat$capi20(0xffffffffffffff9c, &(0x7f0000000100)='/dev/capi20\x00', 0x0, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) syz_init_net_socket$ax25(0x3, 0x3, 0xcc) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_REQBUFS(r3, 0xc0145608, &(0x7f0000000000)={0x0, 0x2, 0x1}) ioctl$VIDIOC_DBG_G_REGISTER(r3, 0xc0385650, &(0x7f0000000000)={{0x3, @name="9017d0ed071df3233d3dbe12c7f38e7a330b8f737ff63a5930248bf4d052b675"}, 0x8, 0x9, 0x8000}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, 0xffffffffffffffff) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, &(0x7f0000000280)={0x1, 0xb, 0x1, 0x10, 0x4, 0x7fff, 0xb}) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) 04:01:29 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 04:01:29 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB], &(0x7f0000000140)=0x2) 04:01:29 executing program 2: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) [ 1892.796923][ T1803] IPVS: ftp: loaded support on port[0] = 21 04:01:29 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194036558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:01:29 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:01:29 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102005ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x10) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, @perf_bp={&(0x7f0000000180), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) socket$inet6_tcp(0xa, 0x1, 0x0) inotify_init1(0x0) socket$packet(0x11, 0x0, 0x300) socket$inet6(0xa, 0x3, 0x84) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x20000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x400) 04:01:29 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:01:29 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194046558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:01:37 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd695}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:01:37 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:01:37 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) dup2(r0, r1) 04:01:37 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194056558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:01:37 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 04:01:37 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB], &(0x7f0000000140)=0x2) 04:01:37 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) [ 1901.384123][ T1860] IPVS: ftp: loaded support on port[0] = 21 04:01:37 executing program 3: flock(0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x22}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) read(r0, &(0x7f0000000500)=""/239, 0xef) write$uinput_user_dev(r0, &(0x7f0000000040)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) read(0xffffffffffffffff, 0x0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) read(0xffffffffffffffff, 0x0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000007c0)) openat$null(0xffffffffffffff9c, 0x0, 0x80000, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1000100) pipe2(0x0, 0x0) syz_open_dev$sndtimer(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, 0x0, 0x0) removexattr(&(0x7f00000002c0)='./bus\x00', 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) 04:01:37 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 04:01:37 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194066558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) [ 1901.598270][ T1876] input: syz1 as /devices/virtual/input/input57 04:01:38 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 04:01:38 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1901.801004][ T1886] input: syz1 as /devices/virtual/input/input58 [ 1901.867740][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1901.873569][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1902.107746][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1902.113565][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:01:46 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:01:46 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB], &(0x7f0000000140)=0x2) 04:01:46 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194086558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:01:46 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 04:01:46 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) creat(0x0, 0x0) 04:01:46 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102005ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x10) getpid() perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x84) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3a5dfc35110c8002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x22, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x20000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) [ 1909.958674][ T1917] IPVS: ftp: loaded support on port[0] = 21 04:01:46 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x7, 0xffffffffffffffff}, 0x14}, 0x1, 0xf000}, 0x0) 04:01:46 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:01:46 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b01940a6558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:01:46 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x7, 0xffffffffffffffff}, 0x14}, 0x1, 0xf000}, 0x0) [ 1910.187768][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1910.193591][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:01:46 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x7, 0xffffffffffffffff}, 0x14}, 0x1, 0xf000}, 0x0) 04:01:46 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b01940b6558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:01:46 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x7, 0xffffffffffffffff}, 0x14}, 0x1, 0xf000}, 0x0) [ 1910.427765][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1910.433625][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:01:47 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488"], &(0x7f0000000140)=0x2) 04:01:47 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:01:47 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b01940c6558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:01:47 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x7, 0xffffffffffffffff}, 0x14}, 0x1, 0xf000}, 0x0) [ 1910.873878][ T1974] IPVS: ftp: loaded support on port[0] = 21 04:01:54 executing program 0: 04:01:54 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 04:01:54 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x7, 0xffffffffffffffff}, 0x14}, 0x1, 0xf000}, 0x0) 04:01:54 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:01:54 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b01940f6558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:01:54 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488"], &(0x7f0000000140)=0x2) 04:01:54 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x7, 0xffffffffffffffff}, 0x14}, 0x1, 0xf000}, 0x0) [ 1918.489049][ T2001] IPVS: ftp: loaded support on port[0] = 21 [ 1918.507789][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1918.513633][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:01:55 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:01:55 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x7, 0xffffffffffffffff}, 0x14}, 0x1, 0xf000}, 0x0) 04:01:55 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194256558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) [ 1918.748324][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1918.754677][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:01:55 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x7, 0xffffffffffffffff}, 0x14}, 0x1, 0xf000}, 0x0) 04:01:55 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1919.227814][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1919.227818][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1919.227870][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1919.233630][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:02:01 executing program 0: 04:02:01 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x7, 0xffffffffffffffff}, 0x14}, 0x1, 0xf000}, 0x0) 04:02:01 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194012558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:02:01 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:02:01 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 04:02:01 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488"], &(0x7f0000000140)=0x2) 04:02:01 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, 0x0, 0x0) [ 1924.739005][ T2056] IPVS: ftp: loaded support on port[0] = 21 [ 1924.747787][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1924.753609][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:02:01 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:02:01 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, 0x0, 0x0) 04:02:01 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194012f58d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:02:01 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1924.987766][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1924.993620][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:02:01 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, 0x0, 0x0) [ 1925.467806][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1925.473671][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1925.477746][ C1] protocol 88fb is buggy, dev hsr_slave_0 04:02:05 executing program 0: 04:02:05 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194015c58d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:02:05 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, 0x0, 0x1, 0xf000}, 0x0) 04:02:05 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:02:05 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 04:02:05 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488e57026408ba40bc2e5c994bdbd0d"], &(0x7f0000000140)=0x2) 04:02:05 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, 0x0, 0x1, 0xf000}, 0x0) [ 1928.893402][ T2107] IPVS: ftp: loaded support on port[0] = 21 [ 1928.907841][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1928.913764][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:02:05 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016525d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:02:05 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:02:05 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, 0x0, 0x1, 0xf000}, 0x0) [ 1929.147793][ C1] protocol 88fb is buggy, dev hsr_slave_0 04:02:05 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={0x0}, 0x1, 0xf000}, 0x0) 04:02:05 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:02:07 executing program 0: 04:02:07 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b019401655ed8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:02:07 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={0x0}, 0x1, 0xf000}, 0x0) 04:02:07 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:02:07 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488e57026408ba40bc2e5c994bdbd0d"], &(0x7f0000000140)=0x2) 04:02:07 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 04:02:07 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={0x0}, 0x1, 0xf000}, 0x0) [ 1930.987801][ C0] net_ratelimit: 9 callbacks suppressed [ 1930.987808][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1930.993552][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1931.014623][ T2162] IPVS: ftp: loaded support on port[0] = 21 04:02:07 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:02:07 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016563d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:02:07 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x14, 0x0, 0x7, 0xffffffffffffffff}, 0x14}, 0x1, 0xf000}, 0x0) [ 1931.227796][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1931.233646][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:02:07 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:02:07 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x14, 0x0, 0x7, 0xffffffffffffffff}, 0x14}, 0x1, 0xf000}, 0x0) [ 1931.707775][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1931.707812][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1931.713581][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1931.713664][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1931.719358][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1931.725078][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:02:11 executing program 0: 04:02:11 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016564d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:02:11 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:02:11 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 04:02:11 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x14, 0x0, 0x7, 0xffffffffffffffff}, 0x14}, 0x1, 0xf000}, 0x0) 04:02:11 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488e57026408ba40bc2e5c994bdbd0d"], &(0x7f0000000140)=0x2) 04:02:11 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x0, 0xffffffffffffffff}, 0x14}, 0x1, 0xf000}, 0x0) 04:02:11 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x0, 0xffffffffffffffff}, 0x14}, 0x1, 0xf000}, 0x0) [ 1935.154579][ T2216] IPVS: ftp: loaded support on port[0] = 21 04:02:11 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:02:11 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016569d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:02:11 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x0, 0xffffffffffffffff}, 0x14}, 0x1, 0xf000}, 0x0) 04:02:11 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b019401656cd8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:02:15 executing program 0: 04:02:15 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x7}, 0x14}, 0x1, 0xf000}, 0x0) 04:02:15 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b019401656fd8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:02:15 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:02:15 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 04:02:15 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488e57026408ba40bc2e5c994bdbd0d4f902fdb5be4c1"], &(0x7f0000000140)=0x2) 04:02:15 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x7}, 0x14}, 0x1, 0xf000}, 0x0) [ 1939.292345][ T2278] IPVS: ftp: loaded support on port[0] = 21 [ 1939.307793][ C0] net_ratelimit: 12 callbacks suppressed [ 1939.307800][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1939.319288][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:02:15 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:02:15 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x14, 0x4000000000003, 0x7}, 0x14}, 0x1, 0xf000}, 0x0) 04:02:15 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016570d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:02:15 executing program 3: [ 1939.547802][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1939.553688][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:02:16 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016573d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:02:16 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1940.027845][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1940.027887][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1940.033755][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1940.045380][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1940.051198][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:02:19 executing program 0: 04:02:19 executing program 3: 04:02:19 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016575d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:02:19 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:02:19 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488e57026408ba40bc2e5c994bdbd0d4f902fdb5be4c1"], &(0x7f0000000140)=0x2) 04:02:19 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 04:02:19 executing program 3: 04:02:19 executing program 3: [ 1943.466271][ T2339] IPVS: ftp: loaded support on port[0] = 21 [ 1943.477765][ C0] protocol 88fb is buggy, dev hsr_slave_0 04:02:19 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:02:19 executing program 3: 04:02:19 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016578d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:02:20 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000300)={0x4c, 0x0, &(0x7f00000006c0)=[@transaction_sg={0x40486311, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f00000007c0)="86"}) 04:02:23 executing program 0: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_int(r0, 0x1, 0x2c, 0x0, &(0x7f0000000080)) 04:02:23 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:02:23 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$char_usb(0xc, 0xb4, 0x0) 04:02:23 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8835c85129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:02:23 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 04:02:23 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488e57026408ba40bc2e5c994bdbd0d4f902fdb5be4c1"], &(0x7f0000000140)=0x2) [ 1947.621066][ T2385] IPVS: ftp: loaded support on port[0] = 21 [ 1947.627834][ C0] net_ratelimit: 11 callbacks suppressed [ 1947.627841][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1947.633640][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:02:24 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_int(r0, 0x1, 0x3e, 0x0, &(0x7f0000000080)) 04:02:24 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d88346855e9b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:02:24 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:02:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001780)="0800b5055e0bcfe87b0071") r1 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_opts(r1, 0x0, 0x2, 0x0, &(0x7f00000001c0)=0x11) [ 1947.867786][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1947.873672][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:02:24 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b89083adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:02:24 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x0) [ 1948.347820][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1948.353695][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1948.357753][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1948.365212][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1948.371113][ C1] protocol 88fb is buggy, dev hsr_slave_0 04:02:30 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x0) 04:02:30 executing program 0: clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$autofs(0xffffffffffffff9c, 0x0, 0x100, 0x0) r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) r1 = epoll_create1(0x0) epoll_wait(r1, &(0x7f0000001580)=[{}], 0x1, 0x44) 04:02:30 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b895e3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:02:30 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:02:30 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 04:02:30 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488e57026408ba40bc2e5c994bdbd0d4f902fdb5be4c1e5ff5af3"], &(0x7f0000000140)=0x2) 04:02:30 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x0) [ 1953.848345][ T2442] IPVS: ftp: loaded support on port[0] = 21 [ 1953.877778][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1953.883710][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:02:30 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:02:30 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c25dec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:02:30 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x0) [ 1954.107785][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1954.113721][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:02:30 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec42532d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:02:30 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x0) 04:02:30 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1954.587775][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1954.593698][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1954.597795][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1954.599639][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1954.605314][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1954.611054][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:02:36 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45e32d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:02:36 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x0) 04:02:36 executing program 0: mknod(&(0x7f0000f80000)='./file0\x00', 0x8001040, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000002c0)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) ioctl$PIO_SCRNMAP(r0, 0x4b41, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) 04:02:36 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488e57026408ba40bc2e5c994bdbd0d4f902fdb5be4c1e5ff5af3"], &(0x7f0000000140)=0x2) 04:02:36 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:02:36 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 04:02:36 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x0) [ 1960.233166][ T2513] IPVS: ftp: loaded support on port[0] = 21 04:02:36 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:02:36 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x0) [ 1960.347789][ C1] net_ratelimit: 2 callbacks suppressed [ 1960.347795][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1960.359266][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:02:36 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec4525cd3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:02:36 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x0) 04:02:36 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f08701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:02:36 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:02:37 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x0) [ 1960.827761][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1960.827793][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1960.833571][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1960.845064][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1960.850819][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1960.856575][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1960.862472][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:02:44 executing program 0: r0 = socket(0x1000000010, 0x4008000000803, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x33c) r1 = gettid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) setsockopt$inet6_opts(r0, 0x29, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x9bd, @rand_addr="a7d2f03f425c677fbbe7abf149d1ca3d", 0x7fffffff}, 0x1c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) tkill(r1, 0x1000000000016) mount$9p_fd(0x0, &(0x7f0000000340)='./file2\x00', &(0x7f0000000380)='9p\x00', 0x200000, &(0x7f0000000480)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@debug={'debug', 0x3d, 0xb7}}, {@cache_loose='cache=loose'}, {@cache_mmap='cache=mmap'}, {@cache_mmap='cache=mmap'}, {@mmap='mmap'}], [{@uid_eq={'uid'}}, {@audit='audit'}, {@dont_hash='dont_hash'}]}}) 04:02:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:02:44 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x0) 04:02:44 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f5e701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:02:44 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 04:02:44 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488e57026408ba40bc2e5c994bdbd0d4f902fdb5be4c1e5ff5af3"], &(0x7f0000000140)=0x2) 04:02:44 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x0) [ 1967.709595][ T2584] IPVS: ftp: loaded support on port[0] = 21 04:02:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:02:44 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c231ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:02:44 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x0) 04:02:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:02:44 executing program 3: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x0) [ 1968.437785][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1968.443632][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:02:50 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000900)={'veth0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={@local, @dev, @ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500088, r1}) 04:02:50 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c251ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:02:50 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:02:50 executing program 3: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x0) 04:02:50 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488e57026408ba40bc2e5c994bdbd0d4f902fdb5be4c1e5ff5af3406e"], &(0x7f0000000140)=0x2) 04:02:50 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, 0x0, 0x0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 04:02:50 executing program 3: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x0) [ 1974.044890][ T2645] IPVS: ftp: loaded support on port[0] = 21 04:02:50 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c2a1ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:02:50 executing program 3: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x0) 04:02:50 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:02:50 executing program 3: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x0) 04:02:50 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c2b1ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) [ 1974.667766][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1974.673619][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:02:54 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:02:54 executing program 3: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x0) 04:02:54 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000900)={'veth0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={@local, @dev, @ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500088, r1}) 04:02:54 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c2d1ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:02:54 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, 0x0, 0x0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 04:02:54 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488e57026408ba40bc2e5c994bdbd0d4f902fdb5be4c1e5ff5af3406e"], &(0x7f0000000140)=0x2) 04:02:54 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x0) [ 1978.179952][ T2710] IPVS: ftp: loaded support on port[0] = 21 04:02:54 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c2e1ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:02:54 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:02:54 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x0) 04:02:54 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:02:54 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x0) 04:02:54 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c301ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:02:55 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x0) [ 1978.828895][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1978.834875][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:02:57 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000900)={'veth0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={@local, @dev, @ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500088, r1}) 04:02:57 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:02:57 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c4c1ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:02:57 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x0) 04:02:57 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, 0x0, 0x0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 04:02:57 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488e57026408ba40bc2e5c994bdbd0d4f902fdb5be4c1e5ff5af3406e"], &(0x7f0000000140)=0x2) [ 1981.232295][ T2784] IPVS: ftp: loaded support on port[0] = 21 04:02:57 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x0) 04:02:57 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c581ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:02:57 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:02:57 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x0) 04:02:58 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:02:58 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c5c1ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) [ 1981.627755][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1981.627791][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1981.633553][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1981.645170][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1981.651063][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1981.656878][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1981.662707][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:03:01 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000900)={'veth0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={@local, @dev, @ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500088, r1}) 04:03:01 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c631ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:03:01 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x0) 04:03:01 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:03:01 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 04:03:01 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488e57026408ba40bc2e5c994bdbd0d4f902fdb5be4c1e5ff5af3406ec0"], &(0x7f0000000140)=0x1) 04:03:01 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x0) [ 1985.461870][ T2840] IPVS: ftp: loaded support on port[0] = 21 04:03:01 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x0) 04:03:01 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c641ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:03:01 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:03:02 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x0) [ 1985.787756][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1985.787790][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1985.793538][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:03:02 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c681ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:03:08 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f00000000c0)) 04:03:08 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:03:08 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x0) 04:03:08 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c691ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:03:08 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 04:03:08 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488e57026408ba40bc2e5c994bdbd0d4f902fdb5be4c1e5ff5af3406ec0"], &(0x7f0000000140)=0x1) [ 1991.683037][ T2902] IPVS: ftp: loaded support on port[0] = 21 04:03:08 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) mknod$loop(0x0, 0x6000, 0x0) 04:03:08 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:03:08 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) mknod$loop(0x0, 0x6000, 0x0) 04:03:08 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c6c1ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) [ 1992.027826][ C1] net_ratelimit: 4 callbacks suppressed [ 1992.027834][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1992.037775][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1992.039298][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1992.045040][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1992.050814][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1992.062209][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1992.068113][ C1] protocol 88fb is buggy, dev hsr_slave_0 04:03:08 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) mknod$loop(0x0, 0x6000, 0x0) [ 1992.073909][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:03:08 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) [ 1996.187835][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1996.187840][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1997.547900][ C0] net_ratelimit: 6 callbacks suppressed [ 1997.553689][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1997.559555][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1997.787924][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1997.793817][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:03:14 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00', {}, 0x11, [0x7ff]}, 0x45c) 04:03:14 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:03:14 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c6f1ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:03:14 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 04:03:14 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 04:03:14 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488e57026408ba40bc2e5c994bdbd0d4f902fdb5be4c1e5ff5af3406ec0"], &(0x7f0000000140)=0x1) 04:03:14 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) [ 1998.144757][ T2958] IPVS: ftp: loaded support on port[0] = 21 04:03:14 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1998.267772][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1998.267812][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1998.273584][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1998.279377][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1998.290782][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1998.296611][ C1] protocol 88fb is buggy, dev hsr_slave_0 04:03:14 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c731ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:03:14 executing program 3: write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) accept$alg(r0, 0x0, 0x0) 04:03:14 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:03:15 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c741ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) [ 2004.357974][ T3013] input: syz1 as /devices/virtual/input/input59 [ 2004.518054][ T3015] input: syz1 as /devices/virtual/input/input60 04:03:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETXF(0xffffffffffffffff, 0x5434, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="b7", 0x1) accept$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000080)) socket(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 04:03:21 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) listen(r0, 0x100000000009) r3 = accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) close(r3) 04:03:21 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 04:03:21 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c751ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:03:21 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, 0x0, 0x0) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 04:03:21 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488e57026408ba40bc2e5c994bdbd0d4f902fdb5be4c1e5ff5af3406ec0"], 0x0) [ 2004.781721][ T3024] IPVS: ftp: loaded support on port[0] = 21 04:03:21 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 04:03:21 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c781ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:03:21 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='vboxnet0bdevcpuset-)wlan0{\\:!securityvmnet0eth0(:@\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 04:03:21 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c7a1ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:03:21 executing program 2: openat(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)=ANY=[@ANYPTR64, @ANYRES64], 0x2}], 0x4}, 0x0) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 04:03:21 executing program 2: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:03:25 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@newqdisc={0x24, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {0x0, 0x2}, {0xffff, 0xffff}}}, 0x24}}, 0x0) 04:03:25 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b90974d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:03:25 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, 0x0, 0x0) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 04:03:25 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) listen(r0, 0x100000000009) r3 = accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) close(r3) 04:03:25 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) listen(r0, 0x100000000009) r3 = accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) close(r3) 04:03:25 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488e57026408ba40bc2e5c994bdbd0d4f902fdb5be4c1e5ff5af3406ec0"], 0x0) [ 2008.966038][ T3108] IPVS: ftp: loaded support on port[0] = 21 04:03:25 executing program 2: 04:03:25 executing program 2: 04:03:25 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c25d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:03:25 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c5cd1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:03:25 executing program 2: 04:03:26 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c20990f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:03:26 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) listen(r0, 0x100000000009) r3 = accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) close(r3) 04:03:26 executing program 2: 04:03:26 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, 0x0, 0x0) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 04:03:26 executing program 2: [ 2010.027766][ C0] net_ratelimit: 1 callbacks suppressed [ 2010.027773][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2010.039467][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2010.267763][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2010.273624][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:03:29 executing program 0: setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYBLOB="6d0400010000994c08fc21be2900000047e2252cb7"], 0x2) ioctl(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b36, &(0x7f0000000000)='wlan0\x00') 04:03:29 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb14bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:03:29 executing program 2: 04:03:29 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 04:03:29 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) listen(r0, 0x100000000009) r3 = accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) close(r3) 04:03:29 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488e57026408ba40bc2e5c994bdbd0d4f902fdb5be4c1e5ff5af3406ec0"], 0x0) [ 2013.296557][ T3206] IPVS: ftp: loaded support on port[0] = 21 04:03:29 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce25ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:03:29 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff038}, {0x80000006}]}, 0x10) 04:03:30 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce5cede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:03:30 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x23, 0x3, 0x1c, 0x2, 0x0, 0x0, 0x0}) 04:03:30 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede325dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:03:30 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) listen(r0, 0x100000000009) r3 = accept(r0, 0x0, 0x0) listen(r0, 0x0) close(r3) [ 2014.065852][ T3247] vhci_hcd: USB_PORT_FEAT_BH_PORT_RESET req not supported for USB 2.0 roothub 04:03:30 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x23, 0x3, 0x1c, 0x2, 0x0, 0x0, 0x0}) [ 2014.479997][ T3263] vhci_hcd: USB_PORT_FEAT_BH_PORT_RESET req not supported for USB 2.0 roothub 04:03:35 executing program 0: memfd_create(&(0x7f0000000880)='\b\xe1m1#+\x00', 0x0) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0x3c) mkdir(0x0, 0x0) r4 = dup(0xffffffffffffffff) r5 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r4, 0xab07, 0x3) symlink(0x0, &(0x7f00000002c0)='./file0\x00') geteuid() fchownat(r5, &(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000400)='./file0\x00', 0x0) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r6, 0x80044dff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001e80)={'vcan0\x00'}) unlink(&(0x7f0000000040)='./file0\x00') 04:03:35 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 04:03:35 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede35edd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:03:35 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0002, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000280)=[{0x10081, 0x6}], 0xd) 04:03:35 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x23, 0x3, 0x1c, 0x2, 0x0, 0x0, 0x0}) 04:03:35 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) listen(r0, 0x100000000009) r3 = accept(r0, 0x0, 0x0) listen(r0, 0x0) close(r3) [ 2019.603861][ T3295] vhci_hcd: USB_PORT_FEAT_BH_PORT_RESET req not supported for USB 2.0 roothub 04:03:36 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x2, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:03:36 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0002, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000280)=[{0x10081, 0x6}], 0xd) 04:03:36 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x23, 0x3, 0x1c, 0x2, 0x0, 0x0, 0x0}) 04:03:36 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x3, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:03:36 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0002, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000280)=[{0x10081, 0x6}], 0xd) 04:03:36 executing program 2: ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, &(0x7f0000000080)={0x23, 0x3, 0x1c, 0x2, 0x0, 0x0, 0x0}) [ 2020.017194][ T3313] vhci_hcd: USB_PORT_FEAT_BH_PORT_RESET req not supported for USB 2.0 roothub 04:03:43 executing program 2: ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, &(0x7f0000000080)={0x23, 0x3, 0x1c, 0x2, 0x0, 0x0, 0x0}) 04:03:43 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x4, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:03:43 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0002, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000280)=[{0x10081, 0x6}], 0xd) 04:03:43 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, {0x0, 0x2, 0x0, 0x0, 0xa}}, 0xe) 04:03:43 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 04:03:43 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) listen(r0, 0x100000000009) r3 = accept(r0, 0x0, 0x0) listen(r0, 0x0) close(r3) 04:03:43 executing program 2: ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, &(0x7f0000000080)={0x23, 0x3, 0x1c, 0x2, 0x0, 0x0, 0x0}) 04:03:43 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0002, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) write$sndseq(r0, &(0x7f0000000280)=[{0x10081, 0x6}], 0xd) 04:03:43 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x5, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:03:43 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0002, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) write$sndseq(r0, &(0x7f0000000280)=[{0x10081, 0x6}], 0xd) 04:03:43 executing program 2: r0 = syz_open_dev$usbfs(0x0, 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x23, 0x3, 0x1c, 0x2, 0x0, 0x0, 0x0}) [ 2027.387750][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2027.387777][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2027.393531][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2027.399309][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2027.410736][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2027.416539][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2027.422374][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:03:43 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x6, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:03:43 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0002, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) write$sndseq(r0, &(0x7f0000000280)=[{0x10081, 0x6}], 0xd) 04:03:43 executing program 2: r0 = syz_open_dev$usbfs(0x0, 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x23, 0x3, 0x1c, 0x2, 0x0, 0x0, 0x0}) 04:03:44 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0002, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000280)=[{0x10081, 0x6}], 0xd) 04:03:47 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0002, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000280)=[{0x10081, 0x6}], 0xd) 04:03:47 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x7, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:03:47 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @link_local={0x1, 0x80, 0xc2, 0x300}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x18, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@generic={0x4, 0x3, "7f"}]}}}}}}}}, 0x0) 04:03:47 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) listen(r0, 0x100000000009) r3 = accept(r0, 0x0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) close(r3) 04:03:47 executing program 2: r0 = syz_open_dev$usbfs(0x0, 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x23, 0x3, 0x1c, 0x2, 0x0, 0x0, 0x0}) 04:03:47 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 04:03:47 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) listen(r0, 0x100000000009) r3 = accept(r0, 0x0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) close(r3) 04:03:47 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0002, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000280)=[{0x10081, 0x6}], 0xd) 04:03:47 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x0, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x23, 0x3, 0x1c, 0x2, 0x0, 0x0, 0x0}) 04:03:47 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x8, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:03:47 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0002, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000280)=[{0x10081, 0x6}], 0xd) 04:03:47 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x0, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x23, 0x3, 0x1c, 0x2, 0x0, 0x0, 0x0}) 04:03:47 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) listen(r0, 0x100000000009) r3 = accept(r0, 0x0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) close(r3) [ 2031.547841][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2031.547874][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2031.553700][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:03:48 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x9, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:03:51 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) listen(r0, 0x100000000009) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) close(0xffffffffffffffff) 04:03:51 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000fef000/0x2000)=nil) 04:03:51 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0002, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000280)=[{0x10081, 0x6}], 0xd) 04:03:51 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x0, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x23, 0x3, 0x1c, 0x2, 0x0, 0x0, 0x0}) 04:03:51 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 04:03:51 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0xa, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:03:51 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x23, 0x3, 0x1c, 0x2, 0x0, 0x0, 0x0}) 04:03:51 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0002, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000280)=[{0x10081, 0x6}], 0xd) 04:03:52 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0xb, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) [ 2035.707788][ C0] net_ratelimit: 4 callbacks suppressed [ 2035.707795][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2035.707819][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2035.713478][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2035.719324][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2035.736473][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2035.742426][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2035.748336][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:03:52 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x23, 0x3, 0x1c, 0x2, 0x0, 0x0, 0x0}) 04:03:52 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0002, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000280)=[{0x10081, 0x6}], 0xd) 04:03:52 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0002, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000280)=[{0x10081, 0x6}], 0xd) 04:03:52 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) listen(r0, 0x100000000009) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) close(0xffffffffffffffff) [ 2039.867918][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2039.868012][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2039.873749][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:03:56 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x23, 0x3, 0x1c, 0x2, 0x0, 0x0, 0x0}) 04:03:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x300000200008990, &(0x7f00000000c0)={'bond0\x00\x00z\a\x00\x00\x00\x00\x06\x00\x05', @ifru_names='ip_vti0\x00\x03\x00'}) write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000100)={0x18}, 0x18) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000006c80), 0x0) migrate_pages(0xffffffffffffffff, 0x8, 0x0, &(0x7f0000000180)) pipe2$9p(&(0x7f0000000240), 0x0) write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) open_tree(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x8001) 04:03:56 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0xc, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:03:56 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0002, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000280)=[{0x10081, 0x6}], 0xd) 04:03:56 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 04:03:56 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) listen(r0, 0x100000000009) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) close(0xffffffffffffffff) 04:03:56 executing program 2: syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, &(0x7f0000000080)={0x23, 0x3, 0x1c, 0x2, 0x0, 0x0, 0x0}) 04:03:56 executing program 5: ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$sndseq(0xffffffffffffffff, &(0x7f0000000280)=[{0x10081, 0x6}], 0xd) 04:03:56 executing program 5: ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$sndseq(0xffffffffffffffff, &(0x7f0000000280)=[{0x10081, 0x6}], 0xd) 04:03:56 executing program 2: syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, &(0x7f0000000080)={0x23, 0x3, 0x1c, 0x2, 0x0, 0x0, 0x0}) 04:03:56 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0xd, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:03:56 executing program 5: ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$sndseq(0xffffffffffffffff, &(0x7f0000000280)=[{0x10081, 0x6}], 0xd) 04:03:56 executing program 2: syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, &(0x7f0000000080)={0x23, 0x3, 0x1c, 0x2, 0x0, 0x0, 0x0}) 04:04:00 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0xa0002, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000280)=[{0x10081, 0x6}], 0xd) 04:04:00 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0xe, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:04:00 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, 0x0) 04:04:00 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) close(r3) 04:04:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x300000200008990, &(0x7f00000000c0)={'bond0\x00\x00z\a\x00\x00\x00\x00\x06\x00\x05', @ifru_names='ip_vti0\x00\x03\x00'}) write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000100)={0x18}, 0x18) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000006c80), 0x0) migrate_pages(0xffffffffffffffff, 0x8, 0x0, &(0x7f0000000180)) pipe2$9p(&(0x7f0000000240), 0x0) write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) open_tree(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x8001) 04:04:00 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x30005, 0x0) 04:04:00 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0xa0002, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000280)=[{0x10081, 0x6}], 0xd) 04:04:00 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x10, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:04:00 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, 0x0) 04:04:00 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0xa0002, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000280)=[{0x10081, 0x6}], 0xd) 04:04:00 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000280)=[{0x10081, 0x6}], 0xd) 04:04:00 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, 0x0) 04:04:01 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x11, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:04:01 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x0, 0x3, 0x1c, 0x2, 0x0, 0x0, 0x0}) 04:04:01 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000280)=[{0x10081, 0x6}], 0xd) 04:04:01 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x0, 0x3, 0x1c, 0x2, 0x0, 0x0, 0x0}) 04:04:06 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000280)=[{0x10081, 0x6}], 0xd) 04:04:06 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) close(r3) 04:04:06 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x12, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:04:06 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x0, 0x3, 0x1c, 0x2, 0x0, 0x0, 0x0}) 04:04:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x300000200008990, &(0x7f00000000c0)={'bond0\x00\x00z\a\x00\x00\x00\x00\x06\x00\x05', @ifru_names='ip_vti0\x00\x03\x00'}) write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000100)={0x18}, 0x18) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000006c80), 0x0) migrate_pages(0xffffffffffffffff, 0x8, 0x0, &(0x7f0000000180)) pipe2$9p(&(0x7f0000000240), 0x0) write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) open_tree(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x8001) 04:04:06 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x30005, 0x0) 04:04:07 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x23, 0x0, 0x1c, 0x2, 0x0, 0x0, 0x0}) 04:04:07 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0002, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000280)=[{0x10081, 0x6}], 0xd) 04:04:07 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x25, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) [ 2050.826693][ T3697] vhci_hcd: default hub control req: 2300 v001c i0002 l0 04:04:07 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x23, 0x0, 0x1c, 0x2, 0x0, 0x0, 0x0}) 04:04:07 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0002, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000280)=[{0x10081, 0x6}], 0xd) [ 2051.085173][ T3717] vhci_hcd: default hub control req: 2300 v001c i0002 l0 04:04:07 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0002, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000280)=[{0x10081, 0x6}], 0xd) 04:04:13 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x23, 0x0, 0x1c, 0x2, 0x0, 0x0, 0x0}) 04:04:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x300000200008990, &(0x7f00000000c0)={'bond0\x00\x00z\a\x00\x00\x00\x00\x06\x00\x05', @ifru_names='ip_vti0\x00\x03\x00'}) write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000100)={0x18}, 0x18) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000006c80), 0x0) migrate_pages(0xffffffffffffffff, 0x8, 0x0, &(0x7f0000000180)) pipe2$9p(&(0x7f0000000240), 0x0) write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) open_tree(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x8001) 04:04:13 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x48, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:04:13 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0002, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000280)=[{0x10081, 0x6}], 0xd) 04:04:13 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) close(r3) 04:04:13 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x30005, 0x0) 04:04:13 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0002, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000280)=[{0x10081, 0x6}], 0xd) [ 2056.925558][ T3743] vhci_hcd: default hub control req: 2300 v001c i0002 l0 04:04:13 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x4c, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:04:13 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0002, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000280)=[{0x10081, 0x6}], 0xd) 04:04:13 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x23, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0}) 04:04:13 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0002, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000280)=[{0x10081, 0x6}], 0xd) 04:04:13 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x23, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0}) 04:04:13 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x5c, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) [ 2057.448909][ T446] vhci_hcd: vhci_device speed not set [ 2057.678218][ T446] vhci_hcd: vhci_device speed not set [ 2057.907858][ T446] vhci_hcd: vhci_device speed not set [ 2058.128895][ T446] vhci_hcd: vhci_device speed not set [ 2058.357811][ T446] vhci_hcd: vhci_device speed not set [ 2058.363434][ T446] usb usb9-port2: Cannot enable. Maybe the USB cable is bad? [ 2058.447779][ T446] vhci_hcd: vhci_device speed not set [ 2058.678356][ T446] vhci_hcd: vhci_device speed not set [ 2058.898299][ T446] vhci_hcd: vhci_device speed not set [ 2059.118143][ T446] vhci_hcd: vhci_device speed not set [ 2059.338040][ T446] vhci_hcd: vhci_device speed not set [ 2059.344095][ T446] usb usb9-port2: Cannot enable. Maybe the USB cable is bad? [ 2059.352457][ T446] usb usb9-port2: attempt power cycle [ 2059.777844][ T446] vhci_hcd: vhci_device speed not set [ 2059.997872][ T446] vhci_hcd: vhci_device speed not set [ 2060.217855][ T446] vhci_hcd: vhci_device speed not set [ 2060.438202][ T446] vhci_hcd: vhci_device speed not set [ 2060.658189][ T446] vhci_hcd: vhci_device speed not set [ 2060.664061][ T446] usb usb9-port2: Cannot enable. Maybe the USB cable is bad? [ 2060.748353][ T446] vhci_hcd: vhci_device speed not set [ 2060.967805][ T446] vhci_hcd: vhci_device speed not set [ 2061.187845][ T446] vhci_hcd: vhci_device speed not set [ 2061.408068][ T446] vhci_hcd: vhci_device speed not set [ 2061.627826][ T446] vhci_hcd: vhci_device speed not set [ 2061.633441][ T446] usb usb9-port2: Cannot enable. Maybe the USB cable is bad? [ 2061.649618][ T446] usb usb9-port2: unable to enumerate USB device 04:04:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x300000200008990, &(0x7f00000000c0)={'bond0\x00\x00z\a\x00\x00\x00\x00\x06\x00\x05', @ifru_names='ip_vti0\x00\x03\x00'}) write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000100)={0x18}, 0x18) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000006c80), 0x0) migrate_pages(0xffffffffffffffff, 0x8, 0x0, &(0x7f0000000180)) pipe2$9p(&(0x7f0000000240), 0x0) write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 04:04:19 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0002, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000280)=[{0x10081, 0x6}], 0xd) 04:04:19 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x68, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:04:19 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) listen(r0, 0x100000000009) r2 = accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) close(r2) 04:04:19 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) 04:04:19 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x23, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0}) 04:04:19 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0002, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000280)=[{0x10081, 0x6}], 0xd) [ 2063.290618][ T446] vhci_hcd: vhci_device speed not set 04:04:19 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x6c, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:04:19 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0002, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) write$sndseq(r0, &(0x7f0000000280)=[{0x10081, 0x6}], 0xd) [ 2063.527881][ T446] vhci_hcd: vhci_device speed not set 04:04:20 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x74, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:04:20 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0002, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) write$sndseq(r0, &(0x7f0000000280)=[{0x10081, 0x6}], 0xd) [ 2063.748352][ T446] vhci_hcd: vhci_device speed not set 04:04:20 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0002, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) write$sndseq(r0, &(0x7f0000000280)=[{0x10081, 0x6}], 0xd) [ 2064.038694][ T446] vhci_hcd: vhci_device speed not set [ 2064.298110][ T446] vhci_hcd: vhci_device speed not set [ 2064.308118][ T446] usb usb9-port2: Cannot enable. Maybe the USB cable is bad? [ 2064.398748][ T446] vhci_hcd: vhci_device speed not set [ 2064.617817][ T446] vhci_hcd: vhci_device speed not set [ 2064.838354][ T446] vhci_hcd: vhci_device speed not set [ 2065.057950][ T446] vhci_hcd: vhci_device speed not set [ 2065.277878][ T446] vhci_hcd: vhci_device speed not set [ 2065.283477][ T446] usb usb9-port2: Cannot enable. Maybe the USB cable is bad? [ 2065.291222][ T446] usb usb9-port2: attempt power cycle [ 2065.707925][ T446] vhci_hcd: vhci_device speed not set [ 2065.927875][ T446] vhci_hcd: vhci_device speed not set [ 2066.147859][ T446] vhci_hcd: vhci_device speed not set [ 2066.367882][ T446] vhci_hcd: vhci_device speed not set [ 2066.597958][ T446] vhci_hcd: vhci_device speed not set [ 2066.603522][ T446] usb usb9-port2: Cannot enable. Maybe the USB cable is bad? [ 2066.687954][ T446] vhci_hcd: vhci_device speed not set [ 2066.908225][ T446] vhci_hcd: vhci_device speed not set [ 2067.127897][ T446] vhci_hcd: vhci_device speed not set [ 2067.347789][ T446] vhci_hcd: vhci_device speed not set [ 2067.567865][ T446] vhci_hcd: vhci_device speed not set [ 2067.573480][ T446] usb usb9-port2: Cannot enable. Maybe the USB cable is bad? [ 2067.584077][ T446] usb usb9-port2: unable to enumerate USB device 04:04:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x300000200008990, &(0x7f00000000c0)={'bond0\x00\x00z\a\x00\x00\x00\x00\x06\x00\x05', @ifru_names='ip_vti0\x00\x03\x00'}) write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000100)={0x18}, 0x18) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000006c80), 0x0) migrate_pages(0xffffffffffffffff, 0x8, 0x0, &(0x7f0000000180)) pipe2$9p(&(0x7f0000000240), 0x0) write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) 04:04:25 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x7a, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:04:25 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) listen(r0, 0x100000000009) r2 = accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) close(r2) 04:04:25 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) 04:04:25 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0002, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(0xffffffffffffffff, &(0x7f0000000280)=[{0x10081, 0x6}], 0xd) 04:04:25 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x23, 0x3, 0x1c, 0x0, 0x0, 0x0, 0x0}) 04:04:25 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0002, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(0xffffffffffffffff, &(0x7f0000000280)=[{0x10081, 0x6}], 0xd) 04:04:25 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0002, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(0xffffffffffffffff, &(0x7f0000000280)=[{0x10081, 0x6}], 0xd) [ 2069.517791][ T505] vhci_hcd: vhci_device speed not set 04:04:25 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x1a0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:04:26 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0002, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, 0x0, 0x0) 04:04:26 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0002, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, 0x0, 0x0) 04:04:26 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x300, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) [ 2069.737896][ T505] vhci_hcd: vhci_device speed not set [ 2069.978033][ T505] vhci_hcd: vhci_device speed not set [ 2070.207892][ T505] vhci_hcd: vhci_device speed not set [ 2070.438061][ T505] vhci_hcd: vhci_device speed not set [ 2070.443686][ T505] usb usb9-port2: Cannot enable. Maybe the USB cable is bad? [ 2070.537873][ T505] vhci_hcd: vhci_device speed not set [ 2070.767855][ T505] vhci_hcd: vhci_device speed not set [ 2070.997910][ T505] vhci_hcd: vhci_device speed not set [ 2071.217800][ T505] vhci_hcd: vhci_device speed not set [ 2071.447835][ T505] vhci_hcd: vhci_device speed not set [ 2071.453413][ T505] usb usb9-port2: Cannot enable. Maybe the USB cable is bad? [ 2071.461322][ T505] usb usb9-port2: attempt power cycle [ 2071.877890][ T505] vhci_hcd: vhci_device speed not set [ 2072.097851][ T505] vhci_hcd: vhci_device speed not set [ 2072.317839][ T505] vhci_hcd: vhci_device speed not set [ 2072.537802][ T505] vhci_hcd: vhci_device speed not set [ 2072.757826][ T505] vhci_hcd: vhci_device speed not set [ 2072.763316][ T505] usb usb9-port2: Cannot enable. Maybe the USB cable is bad? [ 2072.857922][ T505] vhci_hcd: vhci_device speed not set [ 2073.077921][ T505] vhci_hcd: vhci_device speed not set [ 2073.297894][ T505] vhci_hcd: vhci_device speed not set [ 2073.528007][ T505] vhci_hcd: vhci_device speed not set [ 2073.747856][ T505] vhci_hcd: vhci_device speed not set [ 2073.753514][ T505] usb usb9-port2: Cannot enable. Maybe the USB cable is bad? [ 2073.763927][ T505] usb usb9-port2: unable to enumerate USB device [ 2073.770628][ T3865] vhci_hcd: invalid port number 0 04:04:34 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x500, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:04:34 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0002, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, 0x0, 0x0) 04:04:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x300000200008990, &(0x7f00000000c0)={'bond0\x00\x00z\a\x00\x00\x00\x00\x06\x00\x05', @ifru_names='ip_vti0\x00\x03\x00'}) write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000100)={0x18}, 0x18) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000006c80), 0x0) migrate_pages(0xffffffffffffffff, 0x8, 0x0, &(0x7f0000000180)) pipe2$9p(&(0x7f0000000240), 0x0) write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) 04:04:34 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) listen(r0, 0x100000000009) r2 = accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) close(r2) 04:04:34 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x23, 0x3, 0x1c, 0x0, 0x0, 0x0, 0x0}) 04:04:34 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) 04:04:34 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0002, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000280), 0x0) 04:04:34 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x600, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) [ 2077.818038][ T446] vhci_hcd: vhci_device speed not set 04:04:34 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0002, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000280), 0x0) 04:04:34 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0002, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000280), 0x0) 04:04:34 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x700, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:04:34 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0002, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000280)=[{0x0, 0x6}], 0xd) [ 2078.039436][ T446] vhci_hcd: vhci_device speed not set 04:04:34 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0002, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000280)=[{0x0, 0x6}], 0xd) 04:04:34 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0002, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000280)=[{0x0, 0x6}], 0xd) [ 2078.259724][ T446] vhci_hcd: vhci_device speed not set [ 2078.477899][ T446] vhci_hcd: vhci_device speed not set [ 2078.697798][ T446] vhci_hcd: vhci_device speed not set [ 2078.703369][ T446] usb usb9-port2: Cannot enable. Maybe the USB cable is bad? [ 2078.787895][ T446] vhci_hcd: vhci_device speed not set [ 2079.017882][ T446] vhci_hcd: vhci_device speed not set [ 2079.237882][ T446] vhci_hcd: vhci_device speed not set [ 2079.457960][ T446] vhci_hcd: vhci_device speed not set [ 2079.677873][ T446] vhci_hcd: vhci_device speed not set [ 2079.683561][ T446] usb usb9-port2: Cannot enable. Maybe the USB cable is bad? [ 2079.691326][ T446] usb usb9-port2: attempt power cycle [ 2080.127820][ T446] vhci_hcd: vhci_device speed not set [ 2080.347872][ T446] vhci_hcd: vhci_device speed not set [ 2080.567849][ T446] vhci_hcd: vhci_device speed not set [ 2080.787877][ T446] vhci_hcd: vhci_device speed not set [ 2081.007968][ T446] vhci_hcd: vhci_device speed not set [ 2081.013680][ T446] usb usb9-port2: Cannot enable. Maybe the USB cable is bad? [ 2081.097960][ T446] vhci_hcd: vhci_device speed not set [ 2081.317958][ T446] vhci_hcd: vhci_device speed not set [ 2081.537981][ T446] vhci_hcd: vhci_device speed not set [ 2081.757982][ T446] vhci_hcd: vhci_device speed not set [ 2081.977902][ T446] vhci_hcd: vhci_device speed not set [ 2081.983463][ T446] usb usb9-port2: Cannot enable. Maybe the USB cable is bad? [ 2081.993920][ T446] usb usb9-port2: unable to enumerate USB device [ 2082.000740][ T3923] vhci_hcd: invalid port number 0 04:04:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x300000200008990, &(0x7f00000000c0)={'bond0\x00\x00z\a\x00\x00\x00\x00\x06\x00\x05', @ifru_names='ip_vti0\x00\x03\x00'}) write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000100)={0x18}, 0x18) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000006c80), 0x0) migrate_pages(0xffffffffffffffff, 0x8, 0x0, &(0x7f0000000180)) pipe2$9p(&(0x7f0000000240), 0x0) 04:04:42 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0002, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000280)=[{0x10081}], 0xd) 04:04:42 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x900, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:04:42 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) listen(r0, 0x100000000009) r1 = accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) close(r1) 04:04:42 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x0, 0x0) 04:04:42 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x23, 0x3, 0x1c, 0x0, 0x0, 0x0, 0x0}) 04:04:42 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0002, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000280)=[{0x10081}], 0xd) 04:04:42 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0002, 0x0) ioctl$TCSETSF(r0, 0x5404, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f0000000280)=[{0x10081}], 0xd) [ 2086.137962][ T446] vhci_hcd: vhci_device speed not set 04:04:42 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0xa00, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:04:42 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000240)="f3ad643131a7ad7517c88a477fbc1416", 0x10) 04:04:42 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0xb00, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:04:42 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000240)="f3ad643131a7ad7517c88a477fbc1416", 0x10) [ 2086.362875][ T446] vhci_hcd: vhci_device speed not set [ 2086.588638][ T446] vhci_hcd: vhci_device speed not set [ 2086.807827][ T446] vhci_hcd: vhci_device speed not set [ 2087.027940][ T446] vhci_hcd: vhci_device speed not set [ 2087.033501][ T446] usb usb9-port2: Cannot enable. Maybe the USB cable is bad? [ 2087.117869][ T446] vhci_hcd: vhci_device speed not set [ 2087.337818][ T446] vhci_hcd: vhci_device speed not set [ 2087.557944][ T446] vhci_hcd: vhci_device speed not set [ 2087.777825][ T446] vhci_hcd: vhci_device speed not set [ 2087.997850][ T446] vhci_hcd: vhci_device speed not set [ 2088.003413][ T446] usb usb9-port2: Cannot enable. Maybe the USB cable is bad? [ 2088.011337][ T446] usb usb9-port2: attempt power cycle [ 2088.427857][ T446] vhci_hcd: vhci_device speed not set [ 2088.647890][ T446] vhci_hcd: vhci_device speed not set [ 2088.867894][ T446] vhci_hcd: vhci_device speed not set [ 2089.087806][ T446] vhci_hcd: vhci_device speed not set [ 2089.308014][ T446] vhci_hcd: vhci_device speed not set [ 2089.313535][ T446] usb usb9-port2: Cannot enable. Maybe the USB cable is bad? [ 2089.397884][ T446] vhci_hcd: vhci_device speed not set [ 2089.617886][ T446] vhci_hcd: vhci_device speed not set [ 2089.847886][ T446] vhci_hcd: vhci_device speed not set [ 2090.077930][ T446] vhci_hcd: vhci_device speed not set [ 2090.297902][ T446] vhci_hcd: vhci_device speed not set [ 2090.303432][ T446] usb usb9-port2: Cannot enable. Maybe the USB cable is bad? [ 2090.311170][ T446] usb usb9-port2: unable to enumerate USB device [ 2090.318251][ T3983] vhci_hcd: invalid port number 0 04:04:48 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000240)="f3ad643131a7ad7517c88a477fbc1416", 0x10) 04:04:48 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0xc00, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:04:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x300000200008990, &(0x7f00000000c0)={'bond0\x00\x00z\a\x00\x00\x00\x00\x06\x00\x05', @ifru_names='ip_vti0\x00\x03\x00'}) write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000100)={0x18}, 0x18) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000006c80), 0x0) migrate_pages(0xffffffffffffffff, 0x8, 0x0, &(0x7f0000000180)) 04:04:48 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) listen(r0, 0x100000000009) r1 = accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) close(r1) 04:04:48 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x0, 0x0) 04:04:48 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab563e98b4b2a3d27a7082dbb78abd55fba3da80b856445ab100621d6234555c08dc540473786cd89e9b08e3f5972fe9ca162b123e19268c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d00"/137], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@aname={'aname', 0x3d, '9p\x00'}}]}}) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fsync(r3) 04:04:48 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x4, 0x11011, r0, 0x0) 04:04:48 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000240)="f3ad643131a7ad7517c88a477fbc1416", 0x10) 04:04:48 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0xd00, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:04:48 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000240)="f3ad643131a7ad7517c88a477fbc1416", 0x10) 04:04:48 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000240)="f3ad643131a7ad7517c88a477fbc1416", 0x10) 04:04:48 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0xe00, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:04:49 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000240)="f3ad643131a7ad7517c88a477fbc1416", 0x10) 04:04:49 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0xf34, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:04:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x300000200008990, &(0x7f00000000c0)={'bond0\x00\x00z\a\x00\x00\x00\x00\x06\x00\x05', @ifru_names='ip_vti0\x00\x03\x00'}) write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000100)={0x18}, 0x18) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) migrate_pages(0xffffffffffffffff, 0x8, 0x0, &(0x7f0000000180)) 04:04:54 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000240)="f3ad643131a7ad7517c88a477fbc1416", 0x10) 04:04:54 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x1020, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:04:54 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cg\x9agm\x87r\xee\xff\x00\x00K', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) socket$kcm(0x2, 0x2, 0x0) socket$kcm(0xa, 0x522000000003, 0x11) socket$kcm(0x11, 0x2, 0x300) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002f000000b70000000a00000095000000000000006458c2c62fc2868f0399d909a63796c113a80c19aab9d647000000b6cd483be3f0d3253730e711f5969f62c28b22756bedf3cf393d14c46cc4f79fd2b316da4f0de8163f6242fa7323f1740637c48468766af540439fce41f144631ac262dcae08c3d1a1fbe96dd87235b44174f7c0343185089a0f119e31975e551558055dc2dc"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00=', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x139}, 0x48) socket$kcm(0x11, 0x8000000002, 0x300) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, 0x0, 0x0) 04:04:54 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) listen(r0, 0x100000000009) r1 = accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) close(r1) 04:04:54 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x0, 0x0) 04:04:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000240)="f3ad643131a7ad7517c88a477fbc1416", 0x10) 04:04:55 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x1100, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:04:55 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x1200, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:04:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000240)="f3ad643131a7ad7517c88a477fbc1416", 0x10) 04:04:55 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='veth1\x00', 0x228) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) 04:04:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000240)="f3ad643131a7ad7517c88a477fbc1416", 0x10) 04:05:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x300000200008990, &(0x7f00000000c0)={'bond0\x00\x00z\a\x00\x00\x00\x00\x06\x00\x05', @ifru_names='ip_vti0\x00\x03\x00'}) write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000100)={0x18}, 0x18) migrate_pages(0xffffffffffffffff, 0x8, 0x0, &(0x7f0000000180)) 04:05:01 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x1f00, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:05:01 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000240)="f3ad643131a7ad7517c88a477fbc1416", 0x10) 04:05:01 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r0, 0x6431) 04:05:01 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) listen(r0, 0x100000000009) r2 = accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) close(r2) 04:05:01 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5414, &(0x7f0000000140)) 04:05:01 executing program 2: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$USERIO_CMD_SET_PORT_TYPE(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f0000000000)=""/22) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=@newqdisc={0x60, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq={{0x7, 0x1, 'fq\x00'}, {0x34, 0x2, [@TCA_FQ_RATE_ENABLE={0x8, 0xc}, @TCA_FQ_FLOW_DEFAULT_RATE={0x8, 0x9}, @TCA_FQ_FLOW_PLIMIT={0x8}, @TCA_FQ_BUCKETS_LOG={0x8, 0x5}, @TCA_FQ_PLIMIT={0x8}, @TCA_FQ_INITIAL_QUANTUM={0x8, 0x7}]}}]}, 0x60}}, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'\x8awmi\x02\x00', @ifru_flags=0x1000}) 04:05:01 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000240)="f3ad643131a7ad7517c88a477fbc1416", 0x10) 04:05:01 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) 04:05:01 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x2000, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:05:01 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000240)="f3ad643131a7ad7517c88a477fbc1416", 0x10) 04:05:01 executing program 2: r0 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc018620c, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0}) [ 2105.132985][ T4210] binder: 4209:4210 ioctl c018620c 20000300 returned -22 04:05:07 executing program 4: clone(0x41fa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$getregs(0xc, r0, 0x0, &(0x7f0000002140)=""/4096) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 04:05:07 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000240)="f3ad643131a7ad7517c88a477fbc1416", 0x10) 04:05:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x300000200008990, &(0x7f00000000c0)={'bond0\x00\x00z\a\x00\x00\x00\x00\x06\x00\x05', @ifru_names='ip_vti0\x00\x03\x00'}) write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) migrate_pages(0xffffffffffffffff, 0x8, 0x0, &(0x7f0000000180)) 04:05:07 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x2010, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:05:07 executing program 2: r0 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc018620c, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0}) 04:05:07 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) listen(r0, 0x100000000009) r2 = accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) close(r2) 04:05:07 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000240)="f3ad643131a7ad7517c88a477fbc1416", 0x10) 04:05:07 executing program 2: r0 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc018620c, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0}) [ 2111.027736][ T4226] binder: 4225:4226 ioctl c018620c 20000300 returned -22 04:05:07 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, 0x0, 0x0) [ 2111.118578][ T4246] binder: 4244:4246 ioctl c018620c 20000300 returned -22 04:05:07 executing program 2: r0 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc018620c, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0}) 04:05:07 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x2500, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:05:07 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, 0x0, 0x0) [ 2111.244433][ T4260] binder: 4256:4260 ioctl c018620c 20000300 returned -22 04:05:08 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={0x0}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$key(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x5, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x70}}, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000001c0)={{0x0, 0x0, 0x0, 0x270, 0x221}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmmsg(r0, &(0x7f0000000180), 0x400000000000581, 0x0) 04:05:08 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, 0x0, 0x0) 04:05:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x300000200008990, &(0x7f00000000c0)={'bond0\x00\x00z\a\x00\x00\x00\x00\x06\x00\x05', @ifru_names='ip_vti0\x00\x03\x00'}) migrate_pages(0xffffffffffffffff, 0x8, 0x0, &(0x7f0000000180)) 04:05:13 executing program 2: ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc018620c, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0}) 04:05:13 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x340f, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:05:13 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) listen(r0, 0x100000000009) r2 = accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) close(r2) 04:05:13 executing program 5: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0xfc0004) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf3}, 0xb) recvmmsg(r1, &(0x7f0000004900)=[{{&(0x7f0000001480)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f0000001700), 0x0, &(0x7f0000001740)=""/4096, 0x1000, 0x40000}}], 0x500, 0x0, &(0x7f0000004a80)={0x77359400}) 04:05:13 executing program 4: syz_open_procfs(0x0, &(0x7f00000000c0)='environ\x00[\xaaZ\xaf\xc0\x8c\xaa\xaf\xc1DP\xf0_\'\xaf\xeb\x19s\xf3\xafp\xcam\x14\x9cR\x8d\xefh\xbb\xca\xfc\xdeF4\xbbc\x93\xae\xbf\xe6\x7fJL]\xb7\xc0#;,F\xc2\xc8\x93<\x0f7\xe4\x01\xc0\xa6#\x82\x02\xcdT\x02l\x80\xff\xf8\xd8YQL\x06\xdexu!\xb32$\x04&e\\^\xe0nZ') bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) 04:05:13 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000013000/0x4000)=nil, 0x4000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x1b, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 04:05:13 executing program 5: 04:05:13 executing program 2: ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc018620c, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0}) 04:05:13 executing program 5: 04:05:13 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x3f00, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:05:13 executing program 2: ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc018620c, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0}) 04:05:19 executing program 2: r0 = syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc018620c, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0}) 04:05:19 executing program 5: 04:05:19 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x4000, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:05:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() syz_init_net_socket$ax25(0x3, 0x0, 0x0) migrate_pages(0xffffffffffffffff, 0x8, 0x0, &(0x7f0000000180)) 04:05:19 executing program 4: 04:05:19 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in={0x2, 0x0, @loopback}], 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) listen(r0, 0x100000000009) r3 = accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) close(r3) 04:05:19 executing program 4: 04:05:19 executing program 5: 04:05:19 executing program 2: r0 = syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc018620c, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0}) 04:05:19 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x4800, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:05:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x20, 0x0) write$P9_RSYMLINK(r1, &(0x7f00000000c0)={0x14, 0x11, 0x2, {0x4, 0x0, 0x1}}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@IFLA_VTI_LOCAL={0x8, 0x4, @multicast1}]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=@newlink={0x88, 0x11, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x0, 0x4}, [@IFLA_BROADCAST={0xc, 0x2, @local}, @IFLA_WEIGHT={0x8, 0xf, 0x6}, @IFLA_MAP={0x24, 0xe, {0x6, 0x7, 0xfffffffffffffffa, 0x3, 0x8, 0x8001}}, @IFLA_IFALIAS={0x14, 0x14, 'vcan0\x00'}, @IFLA_IFNAME={0x14, 0x3, 'veth1_to_hsr\x00'}, @IFLA_LINKMODE={0x8, 0x11, 0x1}]}, 0x88}}, 0x0) 04:05:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x4000) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xffffff7f) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) fcntl$addseals(r1, 0x409, 0x2) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000080), 0x10) 04:05:20 executing program 2: r0 = syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc018620c, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0}) [ 2123.710138][ T4364] netlink: 'syz-executor.5': attribute type 17 has an invalid length. 04:05:20 executing program 2: syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc018620c, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0}) 04:05:20 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x4c00, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) [ 2123.824993][ T4364] netlink: 'syz-executor.5': attribute type 17 has an invalid length. [ 2123.987957][ T4364] device hsr_slave_1 left promiscuous mode [ 2124.029417][ T4375] netlink: 'syz-executor.5': attribute type 17 has an invalid length. 04:05:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() migrate_pages(0xffffffffffffffff, 0x8, 0x0, &(0x7f0000000180)) 04:05:26 executing program 2: syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc018620c, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0}) 04:05:26 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_emit_ethernet(0x4a, &(0x7f0000000040)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, '\x00', 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @ipv4={[], [], @local}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 04:05:26 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x5c00, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:05:26 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in={0x2, 0x0, @loopback}], 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) listen(r0, 0x100000000009) r3 = accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) close(r3) 04:05:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x4000) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xffffff7f) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) fcntl$addseals(r1, 0x409, 0x2) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000080), 0x10) 04:05:26 executing program 2: syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc018620c, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0}) 04:05:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x4000) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xffffff7f) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) fcntl$addseals(r1, 0x409, 0x2) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000080), 0x10) 04:05:26 executing program 2: r0 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc018620c, 0x0) 04:05:26 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x6800, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) [ 2130.044519][ T4432] binder: 4431:4432 ioctl c018620c 0 returned -14 04:05:26 executing program 2: r0 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc018620c, 0x0) 04:05:26 executing program 2: r0 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc018620c, 0x0) [ 2130.197580][ T4442] binder: 4439:4442 ioctl c018620c 0 returned -14 [ 2130.333762][ T4447] binder: 4445:4447 ioctl c018620c 0 returned -14 04:05:32 executing program 2: socketpair(0xa, 0x3, 0xff, &(0x7f0000000480)) 04:05:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x4000) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xffffff7f) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) fcntl$addseals(r1, 0x409, 0x2) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000080), 0x10) 04:05:32 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x6c00, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:05:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) migrate_pages(0xffffffffffffffff, 0x8, 0x0, &(0x7f0000000180)) 04:05:32 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in={0x2, 0x0, @loopback}], 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) listen(r0, 0x100000000009) r3 = accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) close(r3) 04:05:32 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="57d500000034007d30a12162eeffff0f00000c0316a3e377a2c30100000000000000c10c109400130000000195f61c14d7c4c8de8c"], 0x0, 0x35}, 0x20) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.\x93sage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) gettid() ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000380)={r2, r2}) r3 = socket$kcm(0x11, 0x6, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0, 0x0, 0x0, 0x369}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) socket$kcm(0x11, 0x26, 0x0) r4 = openat$cgroup_int(r2, 0x0, 0x2, 0x0) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffda) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r1, 0x12, 0x0, 0x2, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8}, 0x20) socket$kcm(0xa, 0x6, 0x0) close(r5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x0, 0x80000, 0x20000000000, 0x0) write$cgroup_int(r4, 0x0, 0x3f8b7cdf8934ee9b) socket$kcm(0x2b, 0x3, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000003c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc7000000000000095000000000000008a019530f47bf96df331a5a26e2b0abbd845d89b1367dd06425ea6d7b1f9419cb0d560bae516511d6a29e879f34aefeccb0231275b461617f3a2af30be149c7827de6926c7a38e440185fbd74091bed406eb7d43241dbd059e087690c1e87713f65a60b364e72cb11a991747c69048970f48e8eab06c18f96d3b00"/177], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r7, 0x0, 0x336, 0x0, &(0x7f0000000040)="2eeb6dce93630b0468808eb0e7e9", 0x0, 0x100}, 0x28) 04:05:32 executing program 2: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0x80, 0x0}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff03f0000d698cb89e40f080351fffffff00004000630677fbac141414e9", 0x0, 0x100}, 0x28) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, 0x0) 04:05:32 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x7400, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:05:32 executing program 2: 04:05:32 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="57d500000034007d30a12162eeffff0f00000c0316a3e377a2c30100000000000000c10c109400130000000195f61c14d7c4c8de8c"], 0x0, 0x35}, 0x20) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.\x93sage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) gettid() ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000380)={r2, r2}) r3 = socket$kcm(0x11, 0x6, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0, 0x0, 0x0, 0x369}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) socket$kcm(0x11, 0x26, 0x0) r4 = openat$cgroup_int(r2, 0x0, 0x2, 0x0) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffda) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r1, 0x12, 0x0, 0x2, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8}, 0x20) socket$kcm(0xa, 0x6, 0x0) close(r5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x0, 0x80000, 0x20000000000, 0x0) write$cgroup_int(r4, 0x0, 0x3f8b7cdf8934ee9b) socket$kcm(0x2b, 0x3, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000003c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc7000000000000095000000000000008a019530f47bf96df331a5a26e2b0abbd845d89b1367dd06425ea6d7b1f9419cb0d560bae516511d6a29e879f34aefeccb0231275b461617f3a2af30be149c7827de6926c7a38e440185fbd74091bed406eb7d43241dbd059e087690c1e87713f65a60b364e72cb11a991747c69048970f48e8eab06c18f96d3b00"/177], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r7, 0x0, 0x336, 0x0, &(0x7f0000000040)="2eeb6dce93630b0468808eb0e7e9", 0x0, 0x100}, 0x28) 04:05:32 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x7a00, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:05:32 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="57d500000034007d30a12162eeffff0f00000c0316a3e377a2c30100000000000000c10c109400130000000195f61c14d7c4c8de8c"], 0x0, 0x35}, 0x20) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.\x93sage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) gettid() ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000380)={r2, r2}) r3 = socket$kcm(0x11, 0x6, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0, 0x0, 0x0, 0x369}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) socket$kcm(0x11, 0x26, 0x0) r4 = openat$cgroup_int(r2, 0x0, 0x2, 0x0) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffda) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r1, 0x12, 0x0, 0x2, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8}, 0x20) socket$kcm(0xa, 0x6, 0x0) close(r5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x0, 0x80000, 0x20000000000, 0x0) write$cgroup_int(r4, 0x0, 0x3f8b7cdf8934ee9b) socket$kcm(0x2b, 0x3, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000003c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc7000000000000095000000000000008a019530f47bf96df331a5a26e2b0abbd845d89b1367dd06425ea6d7b1f9419cb0d560bae516511d6a29e879f34aefeccb0231275b461617f3a2af30be149c7827de6926c7a38e440185fbd74091bed406eb7d43241dbd059e087690c1e87713f65a60b364e72cb11a991747c69048970f48e8eab06c18f96d3b00"/177], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r7, 0x0, 0x336, 0x0, &(0x7f0000000040)="2eeb6dce93630b0468808eb0e7e9", 0x0, 0x100}, 0x28) 04:05:32 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="57d500000034007d30a12162eeffff0f00000c0316a3e377a2c30100000000000000c10c109400130000000195f61c14d7c4c8de8c"], 0x0, 0x35}, 0x20) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.\x93sage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) gettid() ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000380)={r2, r2}) r3 = socket$kcm(0x11, 0x6, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0, 0x0, 0x0, 0x369}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) socket$kcm(0x11, 0x26, 0x0) r4 = openat$cgroup_int(r2, 0x0, 0x2, 0x0) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffda) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r1, 0x12, 0x0, 0x2, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8}, 0x20) socket$kcm(0xa, 0x6, 0x0) close(r5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x0, 0x80000, 0x20000000000, 0x0) write$cgroup_int(r4, 0x0, 0x3f8b7cdf8934ee9b) socket$kcm(0x2b, 0x3, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000003c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc7000000000000095000000000000008a019530f47bf96df331a5a26e2b0abbd845d89b1367dd06425ea6d7b1f9419cb0d560bae516511d6a29e879f34aefeccb0231275b461617f3a2af30be149c7827de6926c7a38e440185fbd74091bed406eb7d43241dbd059e087690c1e87713f65a60b364e72cb11a991747c69048970f48e8eab06c18f96d3b00"/177], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r7, 0x0, 0x336, 0x0, &(0x7f0000000040)="2eeb6dce93630b0468808eb0e7e9", 0x0, 0x100}, 0x28) 04:05:38 executing program 2: 04:05:38 executing program 0: migrate_pages(0xffffffffffffffff, 0x8, 0x0, &(0x7f0000000180)) 04:05:38 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x80000, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:05:38 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="57d500000034007d30a12162eeffff0f00000c0316a3e377a2c30100000000000000c10c109400130000000195f61c14d7c4c8de8c"], 0x0, 0x35}, 0x20) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.\x93sage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) gettid() ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000380)={r2, r2}) r3 = socket$kcm(0x11, 0x6, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0, 0x0, 0x0, 0x369}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) socket$kcm(0x11, 0x26, 0x0) r4 = openat$cgroup_int(r2, 0x0, 0x2, 0x0) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffda) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r1, 0x12, 0x0, 0x2, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8}, 0x20) socket$kcm(0xa, 0x6, 0x0) close(r5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x0, 0x80000, 0x20000000000, 0x0) write$cgroup_int(r4, 0x0, 0x3f8b7cdf8934ee9b) socket$kcm(0x2b, 0x3, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000003c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc7000000000000095000000000000008a019530f47bf96df331a5a26e2b0abbd845d89b1367dd06425ea6d7b1f9419cb0d560bae516511d6a29e879f34aefeccb0231275b461617f3a2af30be149c7827de6926c7a38e440185fbd74091bed406eb7d43241dbd059e087690c1e87713f65a60b364e72cb11a991747c69048970f48e8eab06c18f96d3b00"/177], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r7, 0x0, 0x336, 0x0, &(0x7f0000000040)="2eeb6dce93630b0468808eb0e7e9", 0x0, 0x100}, 0x28) 04:05:38 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) listen(r0, 0x100000000009) r3 = accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) close(r3) 04:05:38 executing program 5: 04:05:38 executing program 5: 04:05:38 executing program 2: 04:05:38 executing program 2: 04:05:38 executing program 5: 04:05:38 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x8000a0, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:05:38 executing program 4: 04:05:38 executing program 2: 04:05:44 executing program 0: migrate_pages(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)) 04:05:44 executing program 5: 04:05:44 executing program 4: 04:05:44 executing program 2: 04:05:44 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x1000000, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:05:44 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) listen(r0, 0x100000000009) r3 = accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) close(r3) 04:05:44 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000080)="1c00000019002551075c0165ff0ffc02802000030004000500e1000c", 0x1c) 04:05:44 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, 0x0}], 0x1, 0x51, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:05:44 executing program 4: syz_init_net_socket$ax25(0x3, 0x5, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000240)=[@text16={0x10, &(0x7f00000001c0)="bad004ecb828018ee00f20c06635100000000f22c066b9800000c00f326635010000000f3026262e2e0f381d9cac000f797e3826660f3a0d882ba7fc660f2206f0fe8d0800f20f01f9", 0x49}], 0x1, 0x0, 0x0, 0xfffffffffffffdc5) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000004cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 04:05:45 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) listen(r0, 0x100000000009) r3 = accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) close(r3) 04:05:45 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x2000000, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:05:45 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000030a43ba5d806055b6fdd80b40000000140001000029ec2400020cd37e99d69cda45a95e", 0x4c}], 0x1}, 0x0) 04:05:51 executing program 0: migrate_pages(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)) 04:05:51 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB='d'], 0x1) setsockopt$sock_int(r1, 0x1, 0x22, &(0x7f00000000c0)=0x1, 0x4) recvmmsg(r1, &(0x7f0000002180)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=""/62, 0x3e}}], 0x1, 0x0, 0x0) 04:05:51 executing program 3: setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000001c0)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) listen(0xffffffffffffffff, 0x100000000009) r2 = accept(0xffffffffffffffff, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) close(r2) 04:05:51 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000030a43ba5d806055b6fdd80b40000000140001000029ec2400020cd37e99d69cda45a95e", 0x4c}], 0x1}, 0x0) 04:05:51 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, 0x0}], 0x1, 0x51, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:05:51 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x3000000, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:05:51 executing program 3: setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000001c0)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) listen(0xffffffffffffffff, 0x100000000009) r2 = accept(0xffffffffffffffff, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) close(r2) 04:05:51 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000240)=[@text16={0x10, &(0x7f00000001c0)="bad004ecb828018ee00f20c06635100000000f22c066b9800000c00f326635010000000f3026262e2e0f381d9cac000f797e3826660f3a0d882ba7fc660f2206f0fe8d0800f20f01f9", 0x49}], 0x1, 0x0, 0x0, 0xfffffffffffffdc5) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000004cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:05:51 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000030a43ba5d806055b6fdd80b40000000140001000029ec2400020cd37e99d69cda45a95e", 0x4c}], 0x1}, 0x0) 04:05:51 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x4000000, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:05:51 executing program 3: setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000001c0)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) listen(0xffffffffffffffff, 0x100000000009) r2 = accept(0xffffffffffffffff, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) close(r2) 04:05:51 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000030a43ba5d806055b6fdd80b40000000140001000029ec2400020cd37e99d69cda45a95e", 0x4c}], 0x1}, 0x0) 04:05:57 executing program 0: migrate_pages(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)) 04:05:57 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, 0x0}], 0x1, 0x51, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:05:57 executing program 3: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) listen(r0, 0x100000000009) r3 = accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) close(r3) 04:05:57 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000030a43ba5d806055b6fdd80b40000000140001000029ec2400020cd37e99d69cda45a95e", 0x4c}], 0x1}, 0x0) 04:05:57 executing program 4: r0 = socket$inet(0x2, 0x3, 0x2) sendto$inet(r0, 0x0, 0x2, 0x0, &(0x7f0000000000), 0x10) 04:05:57 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x5000000, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:05:57 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000030a43ba5d806055b6fdd80b40000000140001000029ec2400020cd37e99d69cda45a95e", 0x4c}], 0x1}, 0x0) 04:05:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x57, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x0, 0x0) 04:05:57 executing program 3: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) listen(r0, 0x100000000009) r3 = accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) close(r3) 04:05:57 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x6000000, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:05:57 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000030a43ba5d806055b6fdd80b40000000140001000029ec2400020cd37e99d69cda45a95e", 0x4c}], 0x1}, 0x0) 04:05:57 executing program 3: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) listen(r0, 0x100000000009) r3 = accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) close(r3) 04:06:01 executing program 0: migrate_pages(0xffffffffffffffff, 0x8, 0x0, 0x0) 04:06:01 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffe52, &(0x7f0000000180)={&(0x7f0000000c40)=@delsa={0x3c, 0x11, 0x1, 0x0, 0x0, {@in6=@empty}, [@srcaddr={0x14, 0xd, @in6=@empty}]}, 0x3c}, 0x8}, 0x0) 04:06:01 executing program 2: r0 = socket$inet(0x10, 0x0, 0xc) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000030a43ba5d806055b6fdd80b40000000140001000029ec2400020cd37e99d69cda45a95e", 0x4c}], 0x1}, 0x0) 04:06:01 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x7000000, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:06:01 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x303, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) lsetxattr$trusted_overlay_origin(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="8000f1f63804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x4, 0x0) 04:06:01 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000001c0)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) listen(r0, 0x100000000009) r3 = accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) close(r3) 04:06:01 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000100)=[{0x80000006, 0x0, 0x0, 0x81}]}, 0x10) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r2, 0x407, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") splice(r1, 0x0, r3, 0x0, 0x30005, 0x0) 04:06:01 executing program 2: r0 = socket$inet(0x10, 0x0, 0xc) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000030a43ba5d806055b6fdd80b40000000140001000029ec2400020cd37e99d69cda45a95e", 0x4c}], 0x1}, 0x0) 04:06:01 executing program 2: r0 = socket$inet(0x10, 0x0, 0xc) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000030a43ba5d806055b6fdd80b40000000140001000029ec2400020cd37e99d69cda45a95e", 0x4c}], 0x1}, 0x0) 04:06:01 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x8000000, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) [ 2165.351391][ T4756] EXT4-fs (loop4): bad geometry: block count 1080 exceeds size of device (1 blocks) 04:06:01 executing program 2: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000030a43ba5d806055b6fdd80b40000000140001000029ec2400020cd37e99d69cda45a95e", 0x4c}], 0x1}, 0x0) 04:06:01 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x65c15bf2) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000180)=0x5, 0x4) write$binfmt_elf32(r3, &(0x7f0000000640)=ANY=[], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000040)={'hwsim0\x00', &(0x7f0000000240)=@ethtool_test={0x19, 0x0, 0x3, 0x320, [0xfff]}}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'team0\x00', &(0x7f0000000000)=@ethtool_test={0x19}}) socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000200)=ANY=[@ANYRES16]) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f00000000c0), &(0x7f0000000100)=0x4) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r3, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300), 0xc, &(0x7f0000000440)={&(0x7f00000001c0)={0x20, 0x0, 0x400, 0x0, 0x25dfdbfe, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x20}, 0x44000) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) [ 2166.027816][ C0] net_ratelimit: 5 callbacks suppressed [ 2166.027824][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2166.039374][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:06:05 executing program 4: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x65c15bf2) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000180)=0x5, 0x4) write$binfmt_elf32(r3, &(0x7f0000000640)=ANY=[], 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000040)={'hwsim0\x00', &(0x7f0000000240)=@ethtool_test={0x19, 0x0, 0x3, 0x320, [0xfff]}}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'team0\x00', &(0x7f0000000000)=@ethtool_test={0x19}}) socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000200)=ANY=[@ANYRES16]) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f00000000c0), &(0x7f0000000100)=0x4) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r3, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300), 0xc, &(0x7f0000000440)={&(0x7f00000001c0)={0x20, 0x0, 0x400, 0x0, 0x25dfdbfe, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x20}, 0x44000) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 04:06:05 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x9000000, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:06:05 executing program 2: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000030a43ba5d806055b6fdd80b40000000140001000029ec2400020cd37e99d69cda45a95e", 0x4c}], 0x1}, 0x0) 04:06:05 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000001c0)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) listen(r0, 0x100000000009) r3 = accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) close(r3) 04:06:05 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$llc(r0, &(0x7f0000000280), 0x10) 04:06:05 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000100)=[{0x80000006, 0x0, 0x0, 0x81}]}, 0x10) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r2, 0x407, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") splice(r1, 0x0, r3, 0x0, 0x30005, 0x0) 04:06:05 executing program 2: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000030a43ba5d806055b6fdd80b40000000140001000029ec2400020cd37e99d69cda45a95e", 0x4c}], 0x1}, 0x0) 04:06:05 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0xa000000, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:06:05 executing program 2: socket$inet(0x10, 0x3, 0xc) sendmsg(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000030a43ba5d806055b6fdd80b40000000140001000029ec2400020cd37e99d69cda45a95e", 0x4c}], 0x1}, 0x0) 04:06:05 executing program 2: socket$inet(0x10, 0x3, 0xc) sendmsg(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000030a43ba5d806055b6fdd80b40000000140001000029ec2400020cd37e99d69cda45a95e", 0x4c}], 0x1}, 0x0) 04:06:06 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0xb000000, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:06:06 executing program 2: socket$inet(0x10, 0x3, 0xc) sendmsg(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000030a43ba5d806055b6fdd80b40000000140001000029ec2400020cd37e99d69cda45a95e", 0x4c}], 0x1}, 0x0) 04:06:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/dev_mcast\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x4000000000000002) sendfile(r2, r0, 0x0, 0x6f0a77bd) 04:06:06 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, 0x0, 0x0) 04:06:06 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0xc000000, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:06:06 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f00000001c0)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) listen(r0, 0x100000000009) r3 = accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) close(r3) 04:06:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="85000000220000000700000000000000950000000000000029a9dcd47095441deb1662e583ff9d2ec7c1a86c90e03fc32131a04e86384d353e0259922c18f163391b75950e000000000000ec942cca43522ca9dbcccebe7b3ed9936a748d96d77854a2de8daaf6b00a452fe42a84bbfcb2c76a4015636cd8e7b25778cb6aac86b722d662f593f2dd63d10c7d722f120c82f98e41cdd7ebfae1147a52dae62d0824c973596c68a9d85c11d8f602534ccbcca77b3c823101e02526dfc06648aee02824028360fd0276104ca506d83c9fabe4441a00cd47efb03f8655c7"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000200)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000000e8d5000000010000001400000500242f09880bd320d98a", 0x0, 0x401}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 04:06:09 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, 0x0, 0x0) 04:06:09 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0xd000000, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:06:09 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000100)=[{0x80000006, 0x0, 0x0, 0x81}]}, 0x10) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r2, 0x407, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") splice(r1, 0x0, r3, 0x0, 0x30005, 0x0) 04:06:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/dev_mcast\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x4000000000000002) sendfile(r2, r0, 0x0, 0x6f0a77bd) 04:06:09 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) listen(r0, 0x100000000009) r3 = accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) close(r3) 04:06:09 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, 0x0, 0x0) 04:06:10 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 04:06:10 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0xe000000, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:06:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/dev_mcast\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x4000000000000002) sendfile(r2, r0, 0x0, 0x6f0a77bd) 04:06:10 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 04:06:10 executing program 4: pipe(&(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) mount(0x0, 0x0, 0x0, 0x0, 0x0) 04:06:14 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 04:06:14 executing program 4: pipe(&(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) mount(0x0, 0x0, 0x0, 0x0, 0x0) 04:06:14 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x10000000, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:06:14 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) listen(r0, 0x100000000009) r3 = accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) close(r3) 04:06:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="85000000220000000700000000000000950000000000000029a9dcd47095441deb1662e583ff9d2ec7c1a86c90e03fc32131a04e86384d353e0259922c18f163391b75950e000000000000ec942cca43522ca9dbcccebe7b3ed9936a748d96d77854a2de8daaf6b00a452fe42a84bbfcb2c76a4015636cd8e7b25778cb6aac86b722d662f593f2dd63d10c7d722f120c82f98e41cdd7ebfae1147a52dae62d0824c973596c68a9d85c11d8f602534ccbcca77b3c823101e02526dfc06648aee02824028360fd0276104ca506d83c9fabe4441a00cd47efb03f8655c7"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000200)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000000e8d5000000010000001400000500242f09880bd320d98a", 0x0, 0x401}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 04:06:14 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000100)=[{0x80000006, 0x0, 0x0, 0x81}]}, 0x10) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r2, 0x407, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") splice(r1, 0x0, r3, 0x0, 0x30005, 0x0) 04:06:14 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)}, 0x0) 04:06:14 executing program 4: pipe(&(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) mount(0x0, 0x0, 0x0, 0x0, 0x0) 04:06:14 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x11000000, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:06:14 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)}, 0x0) 04:06:14 executing program 4: pipe(&(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) mount(0x0, 0x0, 0x0, 0x0, 0x0) 04:06:14 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)}, 0x0) 04:06:14 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0) 04:06:14 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x12000000, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:06:14 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0) 04:06:14 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) listen(r0, 0x100000000009) r3 = accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) close(r3) [ 2178.507848][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2178.513885][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:06:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="85000000220000000700000000000000950000000000000029a9dcd47095441deb1662e583ff9d2ec7c1a86c90e03fc32131a04e86384d353e0259922c18f163391b75950e000000000000ec942cca43522ca9dbcccebe7b3ed9936a748d96d77854a2de8daaf6b00a452fe42a84bbfcb2c76a4015636cd8e7b25778cb6aac86b722d662f593f2dd63d10c7d722f120c82f98e41cdd7ebfae1147a52dae62d0824c973596c68a9d85c11d8f602534ccbcca77b3c823101e02526dfc06648aee02824028360fd0276104ca506d83c9fabe4441a00cd47efb03f8655c7"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000200)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000000e8d5000000010000001400000500242f09880bd320d98a", 0x0, 0x401}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 04:06:18 executing program 4: pipe(&(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 04:06:18 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}, 0x0) 04:06:18 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x1f000000, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:06:18 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000100)=[{0x80000006, 0x0, 0x0, 0x81}]}, 0x10) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r2, 0x407, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) splice(r1, 0x0, r3, 0x0, 0x30005, 0x0) 04:06:18 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0), 0x0) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) listen(r0, 0x100000000009) r3 = accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) close(r3) 04:06:18 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)}], 0x1}, 0x0) 04:06:18 executing program 4: pipe(&(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 04:06:18 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)}], 0x1}, 0x0) 04:06:18 executing program 4: pipe(&(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 04:06:18 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x20000000, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:06:18 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)}], 0x1}, 0x0) [ 2182.667813][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2182.673804][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:06:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="85000000220000000700000000000000950000000000000029a9dcd47095441deb1662e583ff9d2ec7c1a86c90e03fc32131a04e86384d353e0259922c18f163391b75950e000000000000ec942cca43522ca9dbcccebe7b3ed9936a748d96d77854a2de8daaf6b00a452fe42a84bbfcb2c76a4015636cd8e7b25778cb6aac86b722d662f593f2dd63d10c7d722f120c82f98e41cdd7ebfae1147a52dae62d0824c973596c68a9d85c11d8f602534ccbcca77b3c823101e02526dfc06648aee02824028360fd0276104ca506d83c9fabe4441a00cd47efb03f8655c7"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000200)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000000e8d5000000010000001400000500242f09880bd320d98a", 0x0, 0x401}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 04:06:22 executing program 4: pipe(&(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 04:06:22 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e2800", 0x26}], 0x1}, 0x0) 04:06:22 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x20100000, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:06:22 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0), 0x0) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) listen(r0, 0x100000000009) r3 = accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) close(r3) 04:06:22 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000100)=[{0x80000006, 0x0, 0x0, 0x81}]}, 0x10) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r2, 0x407, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) splice(r1, 0x0, r3, 0x0, 0x30005, 0x0) 04:06:22 executing program 4: pipe(&(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 04:06:22 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e2800", 0x26}], 0x1}, 0x0) 04:06:22 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0), 0x0) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) listen(r0, 0x100000000009) r3 = accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) close(r3) 04:06:22 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e2800", 0x26}], 0x1}, 0x0) 04:06:22 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x25000000, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:06:22 executing program 4: pipe(&(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) [ 2186.827812][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2186.833726][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:06:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="85000000220000000700000000000000950000000000000029a9dcd47095441deb1662e583ff9d2ec7c1a86c90e03fc32131a04e86384d353e0259922c18f163391b75950e000000000000ec942cca43522ca9dbcccebe7b3ed9936a748d96d77854a2de8daaf6b00a452fe42a84bbfcb2c76a4015636cd8e7b25778cb6aac86b722d662f593f2dd63d10c7d722f120c82f98e41cdd7ebfae1147a52dae62d0824c973596c68a9d85c11d8f602534ccbcca77b3c823101e02526dfc06648aee02824028360fd0276104ca506d83c9fabe4441a00cd47efb03f8655c7"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000200)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000000e8d5000000010000001400000500242f09880bd320d98a", 0x0, 0x401}, 0x28) 04:06:28 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) listen(r0, 0x100000000009) r3 = accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) close(r3) 04:06:28 executing program 4: pipe(&(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 04:06:28 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000030a43ba5d806055b6fdd80b4000000014", 0x39}], 0x1}, 0x0) 04:06:28 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x340f0000, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:06:28 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000100)=[{0x80000006, 0x0, 0x0, 0x81}]}, 0x10) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r2, 0x407, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) splice(r1, 0x0, r3, 0x0, 0x30005, 0x0) 04:06:28 executing program 4: pipe(&(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 04:06:28 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000030a43ba5d806055b6fdd80b4000000014", 0x39}], 0x1}, 0x0) 04:06:28 executing program 4: pipe(&(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 04:06:28 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x3f000000, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:06:29 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000030a43ba5d806055b6fdd80b4000000014", 0x39}], 0x1}, 0x0) 04:06:29 executing program 4: pipe(&(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) [ 2193.067896][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2193.073843][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:06:32 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x40000000, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:06:32 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000030a43ba5d806055b6fdd80b40000000140001000029ec2400020c", 0x43}], 0x1}, 0x0) 04:06:32 executing program 4: pipe(&(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 04:06:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="85000000220000000700000000000000950000000000000029a9dcd47095441deb1662e583ff9d2ec7c1a86c90e03fc32131a04e86384d353e0259922c18f163391b75950e000000000000ec942cca43522ca9dbcccebe7b3ed9936a748d96d77854a2de8daaf6b00a452fe42a84bbfcb2c76a4015636cd8e7b25778cb6aac86b722d662f593f2dd63d10c7d722f120c82f98e41cdd7ebfae1147a52dae62d0824c973596c68a9d85c11d8f602534ccbcca77b3c823101e02526dfc06648aee02824028360fd0276104ca506d83c9fabe4441a00cd47efb03f8655c7"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000200)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000000e8d5000000010000001400000500242f09880bd320d98a", 0x0, 0x401}, 0x28) 04:06:32 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) listen(r0, 0x100000000009) r3 = accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) close(r3) 04:06:32 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000100)=[{0x80000006, 0x0, 0x0, 0x81}]}, 0x10) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r2, 0x407, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") splice(r1, 0x0, r3, 0x0, 0x30005, 0x0) 04:06:32 executing program 4: pipe(&(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 04:06:33 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000030a43ba5d806055b6fdd80b40000000140001000029ec2400020c", 0x43}], 0x1}, 0x0) 04:06:33 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x48000000, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:06:33 executing program 4: pipe(&(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 04:06:33 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000030a43ba5d806055b6fdd80b40000000140001000029ec2400020c", 0x43}], 0x1}, 0x0) 04:06:33 executing program 4: pipe(&(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 04:06:33 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x4c000000, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:06:33 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000030a43ba5d806055b6fdd80b40000000140001000029ec2400020cd37e99d69c", 0x48}], 0x1}, 0x0) 04:06:33 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) [ 2197.227753][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2197.233777][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:06:39 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000030a43ba5d806055b6fdd80b40000000140001000029ec2400020cd37e99d69c", 0x48}], 0x1}, 0x0) 04:06:39 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x5c000000, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:06:39 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 04:06:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="85000000220000000700000000000000950000000000000029a9dcd47095441deb1662e583ff9d2ec7c1a86c90e03fc32131a04e86384d353e0259922c18f163391b75950e000000000000ec942cca43522ca9dbcccebe7b3ed9936a748d96d77854a2de8daaf6b00a452fe42a84bbfcb2c76a4015636cd8e7b25778cb6aac86b722d662f593f2dd63d10c7d722f120c82f98e41cdd7ebfae1147a52dae62d0824c973596c68a9d85c11d8f602534ccbcca77b3c823101e02526dfc06648aee02824028360fd0276104ca506d83c9fabe4441a00cd47efb03f8655c7"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000200)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000000e8d5000000010000001400000500242f09880bd320d98a", 0x0, 0x401}, 0x28) 04:06:39 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) listen(r0, 0x100000000009) r3 = accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) close(r3) 04:06:39 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000100)=[{0x80000006, 0x0, 0x0, 0x81}]}, 0x10) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r2, 0x407, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") splice(r1, 0x0, r3, 0x0, 0x30005, 0x0) 04:06:39 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 04:06:39 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000030a43ba5d806055b6fdd80b40000000140001000029ec2400020cd37e99d69c", 0x48}], 0x1}, 0x0) 04:06:39 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x68000000, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:06:39 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000030a43ba5d806055b6fdd80b40000000140001000029ec2400020cd37e99d69cda45", 0x4a}], 0x1}, 0x0) 04:06:39 executing program 4: pipe(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 04:06:39 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000030a43ba5d806055b6fdd80b40000000140001000029ec2400020cd37e99d69cda45", 0x4a}], 0x1}, 0x0) 04:06:39 executing program 4: pipe(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 04:06:39 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x6c000000, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:06:39 executing program 4: pipe(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) [ 2203.467750][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2203.473638][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:06:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0xe80, 0x0, &(0x7f0000000200)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000000e8d5000000010000001400000500242f09880bd320d98a", 0x0, 0x401}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 04:06:45 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000030a43ba5d806055b6fdd80b40000000140001000029ec2400020cd37e99d69cda45", 0x4a}], 0x1}, 0x0) 04:06:45 executing program 4: pipe(&(0x7f00000001c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 04:06:45 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x74000000, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:06:45 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) listen(r0, 0x100000000009) r3 = accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) close(r3) 04:06:45 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000100)=[{0x80000006, 0x0, 0x0, 0x81}]}, 0x10) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r2, 0x407, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") splice(r1, 0x0, r3, 0x0, 0x30005, 0x0) 04:06:45 executing program 4: pipe(&(0x7f00000001c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 04:06:45 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000030a43ba5d806055b6fdd80b40000000140001000029ec2400020cd37e99d69cda45a9", 0x4b}], 0x1}, 0x0) 04:06:45 executing program 4: pipe(&(0x7f00000001c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 04:06:45 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x7a000000, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:06:45 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000030a43ba5d806055b6fdd80b40000000140001000029ec2400020cd37e99d69cda45a9", 0x4b}], 0x1}, 0x0) 04:06:45 executing program 4: pipe(&(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) [ 2209.717867][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2209.723725][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:06:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0xe80, 0x0, &(0x7f0000000200)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000000e8d5000000010000001400000500242f09880bd320d98a", 0x0, 0x401}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 04:06:49 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x8cffffff, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:06:49 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000030a43ba5d806055b6fdd80b40000000140001000029ec2400020cd37e99d69cda45a9", 0x4b}], 0x1}, 0x0) 04:06:49 executing program 4: pipe(&(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 04:06:49 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) listen(r0, 0x100000000009) r3 = accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) close(r3) 04:06:49 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000100)=[{0x80000006, 0x0, 0x0, 0x81}]}, 0x10) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r2, 0x407, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") splice(r1, 0x0, r3, 0x0, 0x30005, 0x0) 04:06:49 executing program 4: pipe(&(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 04:06:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="85000000220000000700000000000000950000000000000029a9dcd47095441deb1662e583ff9d2ec7c1a86c90e03fc32131a04e86384d353e0259922c18f163391b75950e000000000000ec942cca43522ca9dbcccebe7b3ed9936a748d96d77854a2de8daaf6b00a452fe42a84bbfcb2c76a4015636cd8e7b25778cb6aac86b722d662f593f2dd63d10c7d722f120c82f98e41cdd7ebfae1147a52dae62d0824c973596c68a9d85c11d8f602534ccbcca77b3c823101e02526dfc06648aee02824028360fd0276104ca506d83c9fabe4441a00cd47efb03f8655c7"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000200)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000000e8d5000000010000001400000500242f09880bd320d98a", 0x0, 0x401}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 04:06:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="85000000220000000700000000000000950000000000000029a9dcd47095441deb1662e583ff9d2ec7c1a86c90e03fc32131a04e86384d353e0259922c18f163391b75950e000000000000ec942cca43522ca9dbcccebe7b3ed9936a748d96d77854a2de8daaf6b00a452fe42a84bbfcb2c76a4015636cd8e7b25778cb6aac86b722d662f593f2dd63d10c7d722f120c82f98e41cdd7ebfae1147a52dae62d0824c973596c68a9d85c11d8f602534ccbcca77b3c823101e02526dfc06648aee02824028360fd0276104ca506d83c9fabe4441a00cd47efb03f8655c7"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000200)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000000e8d5000000010000001400000500242f09880bd320d98a", 0x0, 0x401}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 04:06:49 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x97ffffff, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:06:49 executing program 4: pipe(&(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 04:06:49 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/if_inet6\x00}q\xbb%TVa\xaa') preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000180)=""/218, 0xda}], 0x1, 0x0) [ 2213.877808][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2213.883773][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:06:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0xe80, 0x0, &(0x7f0000000200)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000000e8d5000000010000001400000500242f09880bd320d98a", 0x0, 0x401}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 04:06:55 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0xa0008000, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:06:55 executing program 4: pipe(&(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 04:06:55 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000380)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f00000004c0)={0x0, 0x7, 0x4, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "e3b46c1e"}, 0x0, 0x0, @planes=0x0, 0x4}) 04:06:55 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) listen(r0, 0x100000000009) r3 = accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) close(r3) 04:06:55 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000100)=[{0x80000006, 0x0, 0x0, 0x81}]}, 0x10) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r2, 0x407, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") splice(r1, 0x0, r3, 0x0, 0x30005, 0x0) 04:06:55 executing program 2: 04:06:55 executing program 4: pipe(&(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 04:06:56 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0xa0010000, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:06:56 executing program 2: 04:06:56 executing program 4: pipe(&(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 04:06:56 executing program 2: [ 2220.107895][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2220.113739][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:07:02 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="85000000220000000700000000000000950000000000000029a9dcd47095441deb1662e583ff9d2ec7c1a86c90e03fc32131a04e86384d353e0259922c18f163391b75950e000000000000ec942cca43522ca9dbcccebe7b3ed9936a748d96d77854a2de8daaf6b00a452fe42a84bbfcb2c76a4015636cd8e7b25778cb6aac86b722d662f593f2dd63d10c7d722f120c82f98e41cdd7ebfae1147a52dae62d0824c973596c68a9d85c11d8f602534ccbcca77b3c823101e02526dfc06648aee02824028360fd0276104ca506d83c9fabe4441a00cd47efb03f8655c7"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000200)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000000e8d5000000010000001400000500242f09880bd320d98a", 0x0, 0x401}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 04:07:02 executing program 2: 04:07:02 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0xf6ffffff, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:07:02 executing program 4: pipe(&(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 04:07:02 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) listen(r0, 0x100000000009) r3 = accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) close(r3) 04:07:02 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000100)=[{0x80000006, 0x0, 0x0, 0x81}]}, 0x10) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r2, 0x407, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") splice(r1, 0x0, r3, 0x0, 0x30005, 0x0) 04:07:02 executing program 2: 04:07:02 executing program 4: pipe(&(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 04:07:02 executing program 2: 04:07:02 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0xfdfdffff, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:07:02 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1000000005, 0x0, &(0x7f000087fff8)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETLINKNAME(0xffffffffffffffff, 0x89e0, 0x0) sendmmsg$unix(r1, &(0x7f0000004e00)=[{0x0, 0x36b, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x18, 0x1, 0x1, [r0, r0]}}], 0x18}], 0x492492492492556, 0x0) setsockopt$sock_int(r0, 0x1, 0x1d, &(0x7f0000000080)=0xfffffffffffffffe, 0x8f) 04:07:02 executing program 4: pipe(&(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) [ 2226.347786][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2226.353752][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:07:08 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0xfdffffff, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:07:08 executing program 4: pipe(&(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 04:07:08 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="85000000220000000700000000000000950000000000000029a9dcd47095441deb1662e583ff9d2ec7c1a86c90e03fc32131a04e86384d353e0259922c18f163391b75950e000000000000ec942cca43522ca9dbcccebe7b3ed9936a748d96d77854a2de8daaf6b00a452fe42a84bbfcb2c76a4015636cd8e7b25778cb6aac86b722d662f593f2dd63d10c7d722f120c82f98e41cdd7ebfae1147a52dae62d0824c973596c68a9d85c11d8f602534ccbcca77b3c823101e02526dfc06648aee02824028360fd0276104ca506d83c9fabe4441a00cd47efb03f8655c7"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000200)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000000e8d5000000010000001400000500242f09880bd320d98a", 0x0, 0x401}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 04:07:08 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1000000005, 0x0, &(0x7f000087fff8)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGETLINKNAME(0xffffffffffffffff, 0x89e0, 0x0) sendmmsg$unix(r1, &(0x7f0000004e00)=[{0x0, 0x36b, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x18, 0x1, 0x1, [r0, r0]}}], 0x18}], 0x492492492492556, 0x0) setsockopt$sock_int(r0, 0x1, 0x1d, &(0x7f0000000080)=0xfffffffffffffffe, 0x8f) 04:07:08 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000100)=[{0x80000006, 0x0, 0x0, 0x81}]}, 0x10) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r2, 0x407, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") splice(r1, 0x0, r3, 0x0, 0x30005, 0x0) 04:07:08 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) listen(r0, 0x100000000009) r3 = accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) close(r3) 04:07:08 executing program 4: pipe(&(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 04:07:08 executing program 4: pipe(&(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x0, 0x5, 0x7, 0x9}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 04:07:08 executing program 4: pipe(&(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x0, 0x5, 0x7, 0x9}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 04:07:08 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0xfffffdfd, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:07:08 executing program 4: pipe(&(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x0, 0x5, 0x7, 0x9}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 04:07:08 executing program 4: pipe(&(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x0, 0x7, 0x9}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 04:07:08 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0xffffff8c, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:07:08 executing program 4: pipe(&(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x0, 0x7, 0x9}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) [ 2232.597814][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2232.603654][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:07:14 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="85000000220000000700000000000000950000000000000029a9dcd47095441deb1662e583ff9d2ec7c1a86c90e03fc32131a04e86384d353e0259922c18f163391b75950e000000000000ec942cca43522ca9dbcccebe7b3ed9936a748d96d77854a2de8daaf6b00a452fe42a84bbfcb2c76a4015636cd8e7b25778cb6aac86b722d662f593f2dd63d10c7d722f120c82f98e41cdd7ebfae1147a52dae62d0824c973596c68a9d85c11d8f602534ccbcca77b3c823101e02526dfc06648aee02824028360fd0276104ca506d83c9fabe4441a00cd47efb03f8655c7"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000200)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000000e8d5000000010000001400000500242f09880bd320d98a", 0x0, 0x401}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 04:07:14 executing program 4: pipe(&(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x0, 0x7, 0x9}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 04:07:14 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0xffffff97, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:07:14 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) listen(r0, 0x100000000009) r3 = accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) close(r3) 04:07:14 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000100)=[{0x80000006, 0x0, 0x0, 0x81}]}, 0x10) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r2, 0x407, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") splice(r1, 0x0, r3, 0x0, 0x30005, 0x0) 04:07:14 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r0, 0x40186f40, 0x76002d) 04:07:14 executing program 4: pipe(&(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x0, 0x9}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 04:07:14 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r0, 0x40186f40, 0x76002d) [ 2238.233795][ T5578] ubi0: attaching mtd0 [ 2238.246314][ T5578] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) 04:07:14 executing program 4: pipe(&(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x0, 0x9}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) [ 2238.335409][ T5598] ubi0: attaching mtd0 04:07:14 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0xfffffff6, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) [ 2238.380323][ T5598] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) 04:07:14 executing program 4: pipe(&(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x0, 0x9}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 04:07:14 executing program 4: pipe(&(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) [ 2238.827846][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2238.833762][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:07:20 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="85000000220000000700000000000000950000000000000029a9dcd47095441deb1662e583ff9d2ec7c1a86c90e03fc32131a04e86384d353e0259922c18f163391b75950e000000000000ec942cca43522ca9dbcccebe7b3ed9936a748d96d77854a2de8daaf6b00a452fe42a84bbfcb2c76a4015636cd8e7b25778cb6aac86b722d662f593f2dd63d10c7d722f120c82f98e41cdd7ebfae1147a52dae62d0824c973596c68a9d85c11d8f602534ccbcca77b3c823101e02526dfc06648aee02824028360fd0276104ca506d83c9fabe4441a00cd47efb03f8655c7"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0xe80, 0x0, &(0x7f0000000200)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000000e8d5000000010000001400000500242f09880bd320d98a", 0x0, 0x401}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 04:07:20 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r0, 0x40186f40, 0x76002d) 04:07:20 executing program 4: pipe(&(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 04:07:20 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0xfffffffd, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:07:20 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) listen(r0, 0x100000000009) r3 = accept(r0, 0x0, 0x0) listen(r0, 0x0) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) close(r3) 04:07:20 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000100)=[{0x80000006, 0x0, 0x0, 0x81}]}, 0x10) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r2, 0x407, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") splice(r1, 0x0, r3, 0x0, 0x30005, 0x0) 04:07:20 executing program 4: pipe(&(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 04:07:20 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r0, 0x40186f40, 0x76002d) [ 2244.480800][ T5632] ubi0: attaching mtd0 [ 2244.486300][ T5632] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) 04:07:20 executing program 4: pipe(&(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) [ 2244.570721][ T5650] ubi0: attaching mtd0 [ 2244.575209][ T5650] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) 04:07:21 executing program 2: write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000000580)={0x8, "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", 0x1000}, 0x10000005c) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) memfd_create(0x0, 0x0) syz_open_procfs(0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) getdents64(r0, &(0x7f00000005c0)=""/4096, 0x1000) 04:07:21 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000280), 0x0, 0x4}, {&(0x7f0000000380)="3796c69a08b76a6d5006a375617f1a76609a04b690f32bdf379ce2ba18263118940e2f48d6acc124522d3eb3bb932b0194016558d8834685129b890c3adec45232d3adbd8f0c701ccc22e7b93c74d1c23c90f9adecdb84bf82ce74ede341dd2321b3dc1bac11ea8d885cca640a37fc32509608148fcc1e9be7f60747ac4d85373ff577515c29be6c567c86d383edfa", 0x8f, 0x9ce4}, {0x0, 0x1000000000, 0xffffffff}], 0x80008, &(0x7f0000000600)={[{@dir_umask={'dir_umask'}}, {@part={'part', 0x3d, 0x1ff}}, {@iocharset={'iocharset', 0x3d, 'cp862'}}, {@creator={'creator', 0x3d, "ef64b62e"}}, {@session={'session', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, '.,{trustedposix_acl_accesskeyring%([&'}}, {@obj_role={'obj_role', 0x3d, 'eth1wlan1'}}]}) 04:07:21 executing program 4: pipe(&(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) [ 2244.764006][ T5660] ------------[ cut here ]------------ [ 2244.770459][ T5660] WARNING: CPU: 0 PID: 5660 at fs/readdir.c:150 filldir64+0x524/0x620 [ 2244.778719][ T5660] Kernel panic - not syncing: panic_on_warn set ... [ 2244.785393][ T5660] CPU: 0 PID: 5660 Comm: syz-executor.2 Not tainted 5.4.0-rc1+ #0 [ 2244.793198][ T5660] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2244.803250][ T5660] Call Trace: [ 2244.806547][ T5660] dump_stack+0x1d8/0x2f8 [ 2244.810916][ T5660] panic+0x25c/0x799 [ 2244.814808][ T5660] ? __warn+0x105/0x210 [ 2244.819042][ T5660] ? filldir64+0x524/0x620 [ 2244.823438][ T5660] __warn+0x20e/0x210 [ 2244.827481][ T5660] ? filldir64+0x524/0x620 [ 2244.831879][ T5660] report_bug+0x1b6/0x2f0 [ 2244.836204][ T5660] ? filldir64+0x524/0x620 [ 2244.840683][ T5660] do_error_trap+0xd7/0x440 [ 2244.845186][ T5660] do_invalid_op+0x36/0x40 [ 2244.849595][ T5660] ? filldir64+0x524/0x620 [ 2244.854140][ T5660] invalid_op+0x23/0x30 [ 2244.858398][ T5660] RIP: 0010:filldir64+0x524/0x620 [ 2244.863457][ T5660] Code: 00 00 c7 03 f2 ff ff ff b8 f2 ff ff ff 48 83 c4 60 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 55 2c b9 ff 0f 0b eb 07 e8 4c 2c b9 ff <0f> 0b 49 83 c6 24 4c 89 f0 48 c1 e8 03 42 8a 04 20 84 c0 0f 85 b6 [ 2244.883142][ T5660] RSP: 0018:ffff88820ef8fb88 EFLAGS: 00010283 [ 2244.889201][ T5660] RAX: ffffffff81ba0624 RBX: 000000000000000c RCX: 0000000000040000 [ 2244.897168][ T5660] RDX: ffffc9000a387000 RSI: 0000000000002922 RDI: 0000000000002923 [ 2244.905127][ T5660] RBP: ffff88820ef8fc10 R08: ffffffff81ba0134 R09: 0000000000000004 [ 2244.913212][ T5660] R10: fffffbfff1120afb R11: 0000000000000000 R12: dffffc0000000000 [ 2244.921169][ T5660] R13: ffff88820ef8fd30 R14: ffff88820ef8fe88 R15: 000000000000000c [ 2244.929247][ T5660] ? filldir64+0x34/0x620 [ 2244.933552][ T5660] ? filldir64+0x524/0x620 [ 2244.937954][ T5660] ? filldir64+0x524/0x620 [ 2244.942350][ T5660] ? _raw_spin_unlock+0x2c/0x50 [ 2244.947176][ T5660] ? iunique+0x1d9/0x200 [ 2244.951396][ T5660] ? ksys_getdents64+0x3f0/0x3f0 [ 2244.956369][ T5660] __fat_readdir+0x1320/0x1a50 [ 2244.961148][ T5660] ? __kasan_check_write+0x14/0x20 [ 2244.966250][ T5660] ? down_read_killable+0x11e/0x410 [ 2244.971511][ T5660] fat_readdir+0x46/0x50 [ 2244.975738][ T5660] iterate_dir+0x2a4/0x520 [ 2244.980139][ T5660] ksys_getdents64+0x1ea/0x3f0 [ 2244.984882][ T5660] ? ksys_getdents64+0x3f0/0x3f0 [ 2244.989818][ T5660] __x64_sys_getdents64+0x7a/0x90 [ 2244.994839][ T5660] do_syscall_64+0xf7/0x1c0 [ 2244.999347][ T5660] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2245.005225][ T5660] RIP: 0033:0x459a59 [ 2245.009094][ T5660] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2245.028691][ T5660] RSP: 002b:00007fcbff56bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 2245.037096][ T5660] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 2245.045046][ T5660] RDX: 0000000000001000 RSI: 00000000200005c0 RDI: 0000000000000003 [ 2245.053008][ T5660] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2245.060968][ T5660] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcbff56c6d4 [ 2245.068923][ T5660] R13: 00000000004c0533 R14: 00000000004d2c58 R15: 00000000ffffffff [ 2245.078807][ T5660] Kernel Offset: disabled [ 2245.083501][ T5660] Rebooting in 86400 seconds..