ive=1 [ 315.346774] overlayfs: filesystem on './file0' not supported as upperdir [ 315.407675] audit: type=1400 audit(2000000190.660:130): avc: denied { node_bind } for pid=18262 comm="syz-executor.4" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:node_t:s0 tclass=dccp_socket permissive=1 [ 315.463146] audit: type=1400 audit(2000000190.700:131): avc: denied { name_connect } for pid=18262 comm="syz-executor.4" dest=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 03:36:30 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000000c0)="9834620f050520d0f80791b0124141e2e9964180bf108a6796fbc4237909a200800000e666f66d220fa0e5be34d1c4e1f8c421fcc4e101167c5c8ed72e41812047002b0000006e46f18888a1c4101f9b9b73e2571616c4029d027cb2f1100000ad808f2940c44219a775d0f08171a38a806ebb40da9ce5570000008ca065600000c4618de3c0740f2d9600000000cadcdcf340ad0142c4c4a241afa1fbffffff097531313131fba1c9fb110f0f3804830a000000") 03:36:30 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001540)='/dev/btrfs-control\x00', 0x294000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname(r0, 0x0, &(0x7f00000014c0)) 03:36:30 executing program 0: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000340)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x3) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000080)={0x3, 0x0, 0x1, 0x0, 0x0, 0x9}) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0xfffffffffffffec2) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) open$dir(0x0, 0x0, 0x10) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:36:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000600)) r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000480)) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000000)={0x100000000, 0x400, [0x7, 0x64, 0x5, 0x7fff, 0x3f], 0x2}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') 03:36:31 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001540)='/dev/btrfs-control\x00', 0x294000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname(r0, 0x0, &(0x7f00000014c0)) 03:36:31 executing program 0: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000340)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x3) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000080)={0x3, 0x0, 0x1, 0x0, 0x0, 0x9}) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0xfffffffffffffec2) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) open$dir(0x0, 0x0, 0x10) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:36:31 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001540)='/dev/btrfs-control\x00', 0x294000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname(r0, 0x0, &(0x7f00000014c0)) 03:36:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 03:36:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000600)) r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000480)) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000000)={0x100000000, 0x400, [0x7, 0x64, 0x5, 0x7fff, 0x3f], 0x2}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') 03:36:31 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000000c0)="9834620f050520d0f80791b0124141e2e9964180bf108a6796fbc4237909a200800000e666f66d220fa0e5be34d1c4e1f8c421fcc4e101167c5c8ed72e41812047002b0000006e46f18888a1c4101f9b9b73e2571616c4029d027cb2f1100000ad808f2940c44219a775d0f08171a38a806ebb40da9ce5570000008ca065600000c4618de3c0740f2d9600000000cadcdcf340ad0142c4c4a241afa1fbffffff097531313131fba1c9fb110f0f3804830a000000") 03:36:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000600)) r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000480)) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000000)={0x100000000, 0x400, [0x7, 0x64, 0x5, 0x7fff, 0x3f], 0x2}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') 03:36:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000600)) r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000480)) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000000)={0x100000000, 0x400, [0x7, 0x64, 0x5, 0x7fff, 0x3f], 0x2}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') 03:36:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000600)) r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000480)) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000000)={0x100000000, 0x400, [0x7, 0x64, 0x5, 0x7fff, 0x3f], 0x2}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') 03:36:31 executing program 4: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 03:36:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000600)) r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000480)) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000000)={0x100000000, 0x400, [0x7, 0x64, 0x5, 0x7fff, 0x3f], 0x2}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') 03:36:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000600)) r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000480)) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000000)={0x100000000, 0x400, [0x7, 0x64, 0x5, 0x7fff, 0x3f], 0x2}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') 03:36:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000600)) r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000480)) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000000)={0x100000000, 0x400, [0x7, 0x64, 0x5, 0x7fff, 0x3f], 0x2}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') 03:36:32 executing program 3: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:32 executing program 1: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000600)) r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000480)) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000000)={0x100000000, 0x400, [0x7, 0x64, 0x5, 0x7fff, 0x3f], 0x2}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') 03:36:32 executing program 4: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:32 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000000c0)="9834620f050520d0f80791b0124141e2e9964180bf108a6796fbc4237909a200800000e666f66d220fa0e5be34d1c4e1f8c421fcc4e101167c5c8ed72e41812047002b0000006e46f18888a1c4101f9b9b73e2571616c4029d027cb2f1100000ad808f2940c44219a775d0f08171a38a806ebb40da9ce5570000008ca065600000c4618de3c0740f2d9600000000cadcdcf340ad0142c4c4a241afa1fbffffff097531313131fba1c9fb110f0f3804830a000000") 03:36:32 executing program 0: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:33 executing program 5: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:33 executing program 0: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:33 executing program 3: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:33 executing program 1: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:33 executing program 4: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:34 executing program 2: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:34 executing program 1: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:34 executing program 5: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:34 executing program 2: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:34 executing program 0: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:34 executing program 1: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:34 executing program 3: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:35 executing program 4: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:35 executing program 0: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:35 executing program 4: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:35 executing program 0: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:35 executing program 4: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:35 executing program 2: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:35 executing program 5: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:36 executing program 1: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:36 executing program 3: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:36 executing program 5: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:37 executing program 5: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:37 executing program 4: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:37 executing program 0: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:37 executing program 1: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:37 executing program 3: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:37 executing program 2: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:37 executing program 5: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:37 executing program 2: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:37 executing program 3: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:38 executing program 2: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:38 executing program 3: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:38 executing program 4: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:38 executing program 1: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000600)) r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000480)) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000000)={0x100000000, 0x400, [0x7, 0x64, 0x5, 0x7fff, 0x3f], 0x2}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') 03:36:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000600)) r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000480)) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000000)={0x100000000, 0x400, [0x7, 0x64, 0x5, 0x7fff, 0x3f], 0x2}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') 03:36:38 executing program 4: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:38 executing program 1: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000600)) r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000480)) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000000)={0x100000000, 0x400, [0x7, 0x64, 0x5, 0x7fff, 0x3f], 0x2}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') 03:36:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000600)) r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000480)) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000000)={0x100000000, 0x400, [0x7, 0x64, 0x5, 0x7fff, 0x3f], 0x2}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') 03:36:39 executing program 3: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000600)) r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000480)) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000000)={0x100000000, 0x400, [0x7, 0x64, 0x5, 0x7fff, 0x3f], 0x2}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') 03:36:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000600)) r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000480)) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000000)={0x100000000, 0x400, [0x7, 0x64, 0x5, 0x7fff, 0x3f], 0x2}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') 03:36:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000600)) r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000480)) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000000)={0x100000000, 0x400, [0x7, 0x64, 0x5, 0x7fff, 0x3f], 0x2}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') 03:36:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000600)) r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000480)) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000000)={0x100000000, 0x400, [0x7, 0x64, 0x5, 0x7fff, 0x3f], 0x2}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') 03:36:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000600)) r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000480)) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000000)={0x100000000, 0x400, [0x7, 0x64, 0x5, 0x7fff, 0x3f], 0x2}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') 03:36:39 executing program 1: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000600)) r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000480)) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000000)={0x100000000, 0x400, [0x7, 0x64, 0x5, 0x7fff, 0x3f], 0x2}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') 03:36:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000600)) r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000480)) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000000)={0x100000000, 0x400, [0x7, 0x64, 0x5, 0x7fff, 0x3f], 0x2}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') 03:36:40 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001540)='/dev/btrfs-control\x00', 0x294000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname(r0, 0x0, &(0x7f00000014c0)) 03:36:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000600)) r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000480)) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000000)={0x100000000, 0x400, [0x7, 0x64, 0x5, 0x7fff, 0x3f], 0x2}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') 03:36:40 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001540)='/dev/btrfs-control\x00', 0x294000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname(r0, 0x0, &(0x7f00000014c0)) 03:36:40 executing program 3: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000600)) r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000480)) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000000)={0x100000000, 0x400, [0x7, 0x64, 0x5, 0x7fff, 0x3f], 0x2}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') 03:36:40 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001540)='/dev/btrfs-control\x00', 0x294000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname(r0, 0x0, &(0x7f00000014c0)) 03:36:40 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001540)='/dev/btrfs-control\x00', 0x294000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname(r0, 0x0, &(0x7f00000014c0)) 03:36:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000600)) r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000480)) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000000)={0x100000000, 0x400, [0x7, 0x64, 0x5, 0x7fff, 0x3f], 0x2}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') 03:36:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000600)) r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000480)) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000000)={0x100000000, 0x400, [0x7, 0x64, 0x5, 0x7fff, 0x3f], 0x2}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') 03:36:40 executing program 2: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000340)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x3) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000080)={0x3, 0x0, 0x1, 0x0, 0x0, 0x9}) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0xfffffffffffffec2) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) open$dir(0x0, 0x0, 0x10) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:36:40 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001540)='/dev/btrfs-control\x00', 0x294000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname(r0, 0x0, &(0x7f00000014c0)) 03:36:40 executing program 1: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000340)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x3) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000080)={0x3, 0x0, 0x1, 0x0, 0x0, 0x9}) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0xfffffffffffffec2) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) open$dir(0x0, 0x0, 0x10) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:36:40 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001540)='/dev/btrfs-control\x00', 0x294000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname(r0, 0x0, &(0x7f00000014c0)) 03:36:41 executing program 5: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000340)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x3) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000080)={0x3, 0x0, 0x1, 0x0, 0x0, 0x9}) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0xfffffffffffffec2) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) open$dir(0x0, 0x0, 0x10) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:36:41 executing program 0: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000340)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x3) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000080)={0x3, 0x0, 0x1, 0x0, 0x0, 0x9}) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0xfffffffffffffec2) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) open$dir(0x0, 0x0, 0x10) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:36:41 executing program 1: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000340)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x3) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000080)={0x3, 0x0, 0x1, 0x0, 0x0, 0x9}) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0xfffffffffffffec2) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) open$dir(0x0, 0x0, 0x10) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:36:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 03:36:41 executing program 2: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000340)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x3) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000080)={0x3, 0x0, 0x1, 0x0, 0x0, 0x9}) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0xfffffffffffffec2) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) open$dir(0x0, 0x0, 0x10) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:36:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 03:36:41 executing program 5: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000340)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x3) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000080)={0x3, 0x0, 0x1, 0x0, 0x0, 0x9}) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0xfffffffffffffec2) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) open$dir(0x0, 0x0, 0x10) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:36:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 03:36:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 03:36:41 executing program 0: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000340)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x3) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000080)={0x3, 0x0, 0x1, 0x0, 0x0, 0x9}) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0xfffffffffffffec2) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) open$dir(0x0, 0x0, 0x10) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:36:41 executing program 2: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000340)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x3) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000080)={0x3, 0x0, 0x1, 0x0, 0x0, 0x9}) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0xfffffffffffffec2) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) open$dir(0x0, 0x0, 0x10) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:36:41 executing program 1: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000340)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x3) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000080)={0x3, 0x0, 0x1, 0x0, 0x0, 0x9}) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0xfffffffffffffec2) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) open$dir(0x0, 0x0, 0x10) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:36:41 executing program 0: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000340)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x3) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000080)={0x3, 0x0, 0x1, 0x0, 0x0, 0x9}) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0xfffffffffffffec2) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) open$dir(0x0, 0x0, 0x10) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:36:41 executing program 5: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000340)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x3) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000080)={0x3, 0x0, 0x1, 0x0, 0x0, 0x9}) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0xfffffffffffffec2) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) open$dir(0x0, 0x0, 0x10) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:36:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 03:36:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 03:36:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 03:36:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 03:36:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 03:36:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 03:36:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 03:36:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 03:36:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 03:36:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 03:36:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 03:36:42 executing program 4: r0 = socket$unix(0x1, 0x2000000000001, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = fcntl$dupfd(r2, 0x0, r3) mount$9p_fd(0x0, &(0x7f0000000340)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid={'dfltuid'}}]}}) 03:36:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 03:36:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 03:36:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 03:36:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 03:36:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 03:36:42 executing program 4: r0 = socket$unix(0x1, 0x2000000000001, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = fcntl$dupfd(r2, 0x0, r3) mount$9p_fd(0x0, &(0x7f0000000340)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid={'dfltuid'}}]}}) 03:36:42 executing program 4: r0 = socket$unix(0x1, 0x2000000000001, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = fcntl$dupfd(r2, 0x0, r3) mount$9p_fd(0x0, &(0x7f0000000340)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid={'dfltuid'}}]}}) 03:36:42 executing program 1: r0 = socket$unix(0x1, 0x2000000000001, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = fcntl$dupfd(r2, 0x0, r3) mount$9p_fd(0x0, &(0x7f0000000340)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid={'dfltuid'}}]}}) 03:36:42 executing program 2: r0 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r0, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x3, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x3a) 03:36:42 executing program 4: r0 = socket$unix(0x1, 0x2000000000001, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = fcntl$dupfd(r2, 0x0, r3) mount$9p_fd(0x0, &(0x7f0000000340)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid={'dfltuid'}}]}}) 03:36:42 executing program 5: r0 = socket$caif_seqpacket(0x25, 0x5, 0x0) setsockopt$CAIFSO_REQ_PARAM(r0, 0x116, 0x80, 0x0, 0x37c) 03:36:43 executing program 4: pause() syz_execute_func(&(0x7f0000000040)="3666440f50f564ff0941c3c4e1a5f97300660f3a8e16649c675100617b12e5c441dfd04b00c442019dccd211d46f") syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001000)="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") 03:36:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 03:36:43 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000140)=""/65, 0x272cc4e1242b68b2) 03:36:43 executing program 1: r0 = socket$unix(0x1, 0x2000000000001, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = fcntl$dupfd(r2, 0x0, r3) mount$9p_fd(0x0, &(0x7f0000000340)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid={'dfltuid'}}]}}) 03:36:43 executing program 1: r0 = socket$unix(0x1, 0x2000000000001, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = fcntl$dupfd(r2, 0x0, r3) mount$9p_fd(0x0, &(0x7f0000000340)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid={'dfltuid'}}]}}) 03:36:43 executing program 2: r0 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r0, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x3, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x3a) 03:36:43 executing program 5: r0 = socket$caif_seqpacket(0x25, 0x5, 0x0) setsockopt$CAIFSO_REQ_PARAM(r0, 0x116, 0x80, 0x0, 0x37c) 03:36:43 executing program 2: r0 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r0, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x3, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x3a) 03:36:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0xa0000100, 0x0, 0x0, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'user:', '&', 0x20, 0xff}, 0xffffffffffffff81, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$join(0x1, 0x0) 03:36:43 executing program 2: r0 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r0, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x3, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x3a) 03:36:43 executing program 5: r0 = socket$caif_seqpacket(0x25, 0x5, 0x0) setsockopt$CAIFSO_REQ_PARAM(r0, 0x116, 0x80, 0x0, 0x37c) [ 328.005669] overlayfs: fs on 'file0' does not support file handles, falling back to index=off. [ 328.013233] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 03:36:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0xa0000100, 0x0, 0x0, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'user:', '&', 0x20, 0xff}, 0xffffffffffffff81, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$join(0x1, 0x0) [ 328.120576] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 03:36:43 executing program 4: pause() syz_execute_func(&(0x7f0000000040)="3666440f50f564ff0941c3c4e1a5f97300660f3a8e16649c675100617b12e5c441dfd04b00c442019dccd211d46f") syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001000)="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") 03:36:43 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000140)=""/65, 0x272cc4e1242b68b2) 03:36:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0xa0000100, 0x0, 0x0, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'user:', '&', 0x20, 0xff}, 0xffffffffffffff81, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$join(0x1, 0x0) 03:36:43 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000140)=""/65, 0x272cc4e1242b68b2) 03:36:43 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000140)=""/65, 0x272cc4e1242b68b2) 03:36:43 executing program 5: r0 = socket$caif_seqpacket(0x25, 0x5, 0x0) setsockopt$CAIFSO_REQ_PARAM(r0, 0x116, 0x80, 0x0, 0x37c) 03:36:43 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000140)=""/65, 0x272cc4e1242b68b2) 03:36:44 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000140)=""/65, 0x272cc4e1242b68b2) 03:36:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0xa0000100, 0x0, 0x0, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'user:', '&', 0x20, 0xff}, 0xffffffffffffff81, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$join(0x1, 0x0) 03:36:44 executing program 5: pause() syz_execute_func(&(0x7f0000000040)="3666440f50f564ff0941c3c4e1a5f97300660f3a8e16649c675100617b12e5c441dfd04b00c442019dccd211d46f") syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001000)="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") [ 328.635797] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 03:36:44 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000140)=""/65, 0x272cc4e1242b68b2) 03:36:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0xa0000100, 0x0, 0x0, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'user:', '&', 0x20, 0xff}, 0xffffffffffffff81, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$join(0x1, 0x0) [ 328.736266] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 328.816506] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 03:36:44 executing program 4: pause() syz_execute_func(&(0x7f0000000040)="3666440f50f564ff0941c3c4e1a5f97300660f3a8e16649c675100617b12e5c441dfd04b00c442019dccd211d46f") syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001000)="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") 03:36:44 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000140)=""/65, 0x272cc4e1242b68b2) 03:36:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0xa0000100, 0x0, 0x0, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'user:', '&', 0x20, 0xff}, 0xffffffffffffff81, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$join(0x1, 0x0) 03:36:44 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000140)=""/65, 0x272cc4e1242b68b2) 03:36:44 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000140)=""/65, 0x272cc4e1242b68b2) 03:36:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0xa0000100, 0x0, 0x0, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'user:', '&', 0x20, 0xff}, 0xffffffffffffff81, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$join(0x1, 0x0) 03:36:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0xa0000100, 0x0, 0x0, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'user:', '&', 0x20, 0xff}, 0xffffffffffffff81, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$join(0x1, 0x0) [ 329.508763] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 03:36:44 executing program 5: pause() syz_execute_func(&(0x7f0000000040)="3666440f50f564ff0941c3c4e1a5f97300660f3a8e16649c675100617b12e5c441dfd04b00c442019dccd211d46f") syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001000)="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") 03:36:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0xa0000100, 0x0, 0x0, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'user:', '&', 0x20, 0xff}, 0xffffffffffffff81, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$join(0x1, 0x0) 03:36:44 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x1, 0x0) read$FUSE(r0, &(0x7f0000000240), 0x1000) [ 329.622048] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 03:36:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0xa0000100, 0x0, 0x0, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'user:', '&', 0x20, 0xff}, 0xffffffffffffff81, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$join(0x1, 0x0) 03:36:45 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x11) [ 329.672984] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 329.693290] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 329.757397] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 03:36:45 executing program 4: pause() syz_execute_func(&(0x7f0000000040)="3666440f50f564ff0941c3c4e1a5f97300660f3a8e16649c675100617b12e5c441dfd04b00c442019dccd211d46f") syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001000)="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") 03:36:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0xa0000100, 0x0, 0x0, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'user:', '&', 0x20, 0xff}, 0xffffffffffffff81, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$join(0x1, 0x0) 03:36:45 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x11) 03:36:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0xa0000100, 0x0, 0x0, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'user:', '&', 0x20, 0xff}, 0xffffffffffffff81, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$join(0x1, 0x0) 03:36:45 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x1, 0x0) read$FUSE(r0, &(0x7f0000000240), 0x1000) 03:36:45 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x1, 0x0) read$FUSE(r0, &(0x7f0000000240), 0x1000) 03:36:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0xa0000100, 0x0, 0x0, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'user:', '&', 0x20, 0xff}, 0xffffffffffffff81, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$join(0x1, 0x0) [ 330.352157] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 330.371761] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 03:36:45 executing program 5: pause() syz_execute_func(&(0x7f0000000040)="3666440f50f564ff0941c3c4e1a5f97300660f3a8e16649c675100617b12e5c441dfd04b00c442019dccd211d46f") syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001000)="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") 03:36:45 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x11) 03:36:45 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x11) 03:36:45 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x11) [ 330.458317] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 03:36:45 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x11) 03:36:46 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x1, 0x0) read$FUSE(r0, &(0x7f0000000240), 0x1000) 03:36:46 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x11) 03:36:46 executing program 1: mlockall(0x1) clone(0xc80000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x402200, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000180)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x0, 0x0) bind$bt_sco(r1, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x20000080000, 0x0) mlockall(0x1) 03:36:46 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x1, 0x0) read$FUSE(r0, &(0x7f0000000240), 0x1000) 03:36:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$unix(0x1, 0x5, 0x0) close(r0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) close(r2) close(r1) pipe(&(0x7f0000000000)) splice(r0, 0x0, r2, 0x0, 0x6d5d, 0x0) 03:36:46 executing program 2: openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x36b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@empty}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x51) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/sockstat\x00') 03:36:46 executing program 5: r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f00000003c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,G\x87\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3_8\xab\x9f-h\x12\xe2\xf4km\xfes\xe0\xea4Nb]\xe5}\xc9\xb2\xd5K\\f&\xc05\xd07\x14\x9b\x99\xf7\x81^\x9e\xee', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 03:36:46 executing program 5: r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f00000003c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,G\x87\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3_8\xab\x9f-h\x12\xe2\xf4km\xfes\xe0\xea4Nb]\xe5}\xc9\xb2\xd5K\\f&\xc05\xd07\x14\x9b\x99\xf7\x81^\x9e\xee', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 03:36:46 executing program 5: r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f00000003c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,G\x87\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3_8\xab\x9f-h\x12\xe2\xf4km\xfes\xe0\xea4Nb]\xe5}\xc9\xb2\xd5K\\f&\xc05\xd07\x14\x9b\x99\xf7\x81^\x9e\xee', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 03:36:46 executing program 5: r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f00000003c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,G\x87\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3_8\xab\x9f-h\x12\xe2\xf4km\xfes\xe0\xea4Nb]\xe5}\xc9\xb2\xd5K\\f&\xc05\xd07\x14\x9b\x99\xf7\x81^\x9e\xee', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 03:36:46 executing program 2: openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x36b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@empty}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x51) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/sockstat\x00') 03:36:46 executing program 5: openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x36b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@empty}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x51) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/sockstat\x00') 03:36:47 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x1, 0x0) read$FUSE(r0, &(0x7f0000000240), 0x1000) 03:36:47 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x1, 0x0) read$FUSE(r0, &(0x7f0000000240), 0x1000) 03:36:47 executing program 1: mlockall(0x1) clone(0xc80000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x402200, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000180)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x0, 0x0) bind$bt_sco(r1, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x20000080000, 0x0) mlockall(0x1) 03:36:47 executing program 2: openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x36b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@empty}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x51) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/sockstat\x00') 03:36:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$unix(0x1, 0x5, 0x0) close(r0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) close(r2) close(r1) pipe(&(0x7f0000000000)) splice(r0, 0x0, r2, 0x0, 0x6d5d, 0x0) 03:36:49 executing program 5: openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x36b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@empty}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x51) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/sockstat\x00') 03:36:49 executing program 2: openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x36b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@empty}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x51) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/sockstat\x00') 03:36:49 executing program 3: mlockall(0x1) clone(0xc80000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x402200, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000180)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x0, 0x0) bind$bt_sco(r1, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x20000080000, 0x0) mlockall(0x1) 03:36:49 executing program 0: mlockall(0x1) clone(0xc80000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x402200, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000180)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x0, 0x0) bind$bt_sco(r1, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x20000080000, 0x0) mlockall(0x1) 03:36:49 executing program 1: mlockall(0x1) clone(0xc80000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x402200, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000180)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x0, 0x0) bind$bt_sco(r1, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x20000080000, 0x0) mlockall(0x1) 03:36:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$unix(0x1, 0x5, 0x0) close(r0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) close(r2) close(r1) pipe(&(0x7f0000000000)) splice(r0, 0x0, r2, 0x0, 0x6d5d, 0x0) 03:36:50 executing program 5: openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x36b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@empty}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x51) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/sockstat\x00') 03:36:50 executing program 0: mlockall(0x1) clone(0xc80000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x402200, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000180)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x0, 0x0) bind$bt_sco(r1, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x20000080000, 0x0) mlockall(0x1) 03:36:50 executing program 3: mlockall(0x1) clone(0xc80000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x402200, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000180)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x0, 0x0) bind$bt_sco(r1, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x20000080000, 0x0) mlockall(0x1) 03:36:50 executing program 1: mlockall(0x1) clone(0xc80000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x402200, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000180)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x0, 0x0) bind$bt_sco(r1, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x20000080000, 0x0) mlockall(0x1) 03:36:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$unix(0x1, 0x5, 0x0) close(r0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) close(r2) close(r1) pipe(&(0x7f0000000000)) splice(r0, 0x0, r2, 0x0, 0x6d5d, 0x0) 03:36:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$unix(0x1, 0x5, 0x0) close(r0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) close(r2) close(r1) pipe(&(0x7f0000000000)) splice(r0, 0x0, r2, 0x0, 0x6d5d, 0x0) 03:36:52 executing program 0: mlockall(0x1) clone(0xc80000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x402200, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000180)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x0, 0x0) bind$bt_sco(r1, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x20000080000, 0x0) mlockall(0x1) 03:36:52 executing program 3: mlockall(0x1) clone(0xc80000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x402200, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000180)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x0, 0x0) bind$bt_sco(r1, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x20000080000, 0x0) mlockall(0x1) 03:36:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$unix(0x1, 0x5, 0x0) close(r0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) close(r2) close(r1) pipe(&(0x7f0000000000)) splice(r0, 0x0, r2, 0x0, 0x6d5d, 0x0) 03:36:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$unix(0x1, 0x5, 0x0) close(r0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) close(r2) close(r1) pipe(&(0x7f0000000000)) splice(r0, 0x0, r2, 0x0, 0x6d5d, 0x0) 03:36:53 executing program 0: mlockall(0x1) clone(0xc80000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x402200, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000180)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x0, 0x0) bind$bt_sco(r1, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x20000080000, 0x0) mlockall(0x1) 03:36:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$unix(0x1, 0x5, 0x0) close(r0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) close(r2) close(r1) pipe(&(0x7f0000000000)) splice(r0, 0x0, r2, 0x0, 0x6d5d, 0x0) 03:36:53 executing program 0: mlockall(0x1) clone(0xc80000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x402200, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000180)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x0, 0x0) bind$bt_sco(r1, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x20000080000, 0x0) mlockall(0x1) 03:36:53 executing program 0: mlockall(0x1) clone(0xc80000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x402200, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000180)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x0, 0x0) bind$bt_sco(r1, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x20000080000, 0x0) mlockall(0x1) 03:36:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$unix(0x1, 0x5, 0x0) close(r0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) close(r2) close(r1) pipe(&(0x7f0000000000)) splice(r0, 0x0, r2, 0x0, 0x6d5d, 0x0) 03:36:54 executing program 0: mlockall(0x1) clone(0xc80000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x402200, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000180)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x0, 0x0) bind$bt_sco(r1, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x20000080000, 0x0) mlockall(0x1) 03:36:54 executing program 0: mlockall(0x1) clone(0xc80000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x402200, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000180)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x0, 0x0) bind$bt_sco(r1, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x20000080000, 0x0) mlockall(0x1) 03:36:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$unix(0x1, 0x5, 0x0) close(r0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) close(r2) close(r1) pipe(&(0x7f0000000000)) splice(r0, 0x0, r2, 0x0, 0x6d5d, 0x0) 03:36:55 executing program 0: mlockall(0x1) clone(0xc80000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x402200, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000180)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x0, 0x0) bind$bt_sco(r1, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x20000080000, 0x0) mlockall(0x1) 03:36:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$unix(0x1, 0x5, 0x0) close(r0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) close(r2) close(r1) pipe(&(0x7f0000000000)) splice(r0, 0x0, r2, 0x0, 0x6d5d, 0x0) 03:36:55 executing program 0: openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x36b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@empty}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x51) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/sockstat\x00') 03:36:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$unix(0x1, 0x5, 0x0) close(r0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) close(r2) close(r1) pipe(&(0x7f0000000000)) splice(r0, 0x0, r2, 0x0, 0x6d5d, 0x0) 03:36:56 executing program 0: openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x36b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@empty}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x51) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/sockstat\x00') 03:36:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$unix(0x1, 0x5, 0x0) close(r0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) close(r2) close(r1) pipe(&(0x7f0000000000)) splice(r0, 0x0, r2, 0x0, 0x6d5d, 0x0) 03:36:56 executing program 0: openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x36b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@empty}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x51) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/sockstat\x00') 03:36:56 executing program 0: openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x36b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@empty}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x51) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/sockstat\x00') 03:36:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$unix(0x1, 0x5, 0x0) close(r0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) close(r2) close(r1) pipe(&(0x7f0000000000)) splice(r0, 0x0, r2, 0x0, 0x6d5d, 0x0) 03:36:56 executing program 0: openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x36b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@empty}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x51) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/sockstat\x00') 03:36:57 executing program 0: openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x36b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@empty}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x51) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/sockstat\x00') 03:36:58 executing program 0: openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x36b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@empty}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x51) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/sockstat\x00') 03:36:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$unix(0x1, 0x5, 0x0) close(r0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) close(r2) close(r1) pipe(&(0x7f0000000000)) splice(r0, 0x0, r2, 0x0, 0x6d5d, 0x0) 03:36:58 executing program 4: openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x36b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@empty}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x51) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/sockstat\x00') 03:36:58 executing program 4: openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x36b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@empty}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x51) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/sockstat\x00') 03:36:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$unix(0x1, 0x5, 0x0) close(r0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) close(r2) close(r1) pipe(&(0x7f0000000000)) splice(r0, 0x0, r2, 0x0, 0x6d5d, 0x0) 03:36:59 executing program 0: openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x36b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@empty}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x51) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/sockstat\x00') 03:36:59 executing program 0: openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x36b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@empty}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x51) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/sockstat\x00') 03:36:59 executing program 4: openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x36b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@empty}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x51) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/sockstat\x00') 03:36:59 executing program 2: openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x36b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@empty}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x51) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/sockstat\x00') 03:36:59 executing program 2: openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x36b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@empty}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x51) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/sockstat\x00') 03:36:59 executing program 4: r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f00000003c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,G\x87\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3_8\xab\x9f-h\x12\xe2\xf4km\xfes\xe0\xea4Nb]\xe5}\xc9\xb2\xd5K\\f&\xc05\xd07\x14\x9b\x99\xf7\x81^\x9e\xee', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 03:36:59 executing program 0: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001740)) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f00000000c0), 0x21f) bind$inet6(r0, &(0x7f0000d1a000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) shutdown(r0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x4000) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20040000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x3, 0x200000) r2 = syz_open_dev$swradio(&(0x7f0000000300)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet6_buf(r2, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f00000002c0)=0x28) r3 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xa8, 0x10000) accept$unix(r3, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0xffffffffffffffea) write$P9_RWALK(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="160000006f010001000c0000000002000000000000009f8f460744eaceff007869360873d41b5a583b5da7eb7faefe2af1895db99cca04c056121996eedd3c90c570cd89be76ddfc761fb23623d3c454dafeab071071134df173dbc600000000d5000005"], 0x64) 03:36:59 executing program 5: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x97d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) close(r0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) [ 345.510245] IPVS: ftp: loaded support on port[0] = 21 03:37:01 executing program 2: openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x36b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@empty}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x51) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/sockstat\x00') 03:37:01 executing program 0: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001740)) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f00000000c0), 0x21f) bind$inet6(r0, &(0x7f0000d1a000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) shutdown(r0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x4000) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20040000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x3, 0x200000) r2 = syz_open_dev$swradio(&(0x7f0000000300)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet6_buf(r2, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f00000002c0)=0x28) r3 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xa8, 0x10000) accept$unix(r3, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0xffffffffffffffea) write$P9_RWALK(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="160000006f010001000c0000000002000000000000009f8f460744eaceff007869360873d41b5a583b5da7eb7faefe2af1895db99cca04c056121996eedd3c90c570cd89be76ddfc761fb23623d3c454dafeab071071134df173dbc600000000d5000005"], 0x64) 03:37:01 executing program 5: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x97d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) close(r0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) 03:37:02 executing program 2: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001740)) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f00000000c0), 0x21f) bind$inet6(r0, &(0x7f0000d1a000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) shutdown(r0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x4000) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20040000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x3, 0x200000) r2 = syz_open_dev$swradio(&(0x7f0000000300)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet6_buf(r2, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f00000002c0)=0x28) r3 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xa8, 0x10000) accept$unix(r3, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0xffffffffffffffea) write$P9_RWALK(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="160000006f010001000c0000000002000000000000009f8f460744eaceff007869360873d41b5a583b5da7eb7faefe2af1895db99cca04c056121996eedd3c90c570cd89be76ddfc761fb23623d3c454dafeab071071134df173dbc600000000d5000005"], 0x64) 03:37:02 executing program 1: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001740)) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f00000000c0), 0x21f) bind$inet6(r0, &(0x7f0000d1a000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) shutdown(r0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x4000) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20040000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x3, 0x200000) r2 = syz_open_dev$swradio(&(0x7f0000000300)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet6_buf(r2, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f00000002c0)=0x28) r3 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xa8, 0x10000) accept$unix(r3, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0xffffffffffffffea) write$P9_RWALK(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="160000006f010001000c0000000002000000000000009f8f460744eaceff007869360873d41b5a583b5da7eb7faefe2af1895db99cca04c056121996eedd3c90c570cd89be76ddfc761fb23623d3c454dafeab071071134df173dbc600000000d5000005"], 0x64) 03:37:02 executing program 4: r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f00000003c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,G\x87\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3_8\xab\x9f-h\x12\xe2\xf4km\xfes\xe0\xea4Nb]\xe5}\xc9\xb2\xd5K\\f&\xc05\xd07\x14\x9b\x99\xf7\x81^\x9e\xee', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 03:37:02 executing program 5: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x97d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) close(r0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) 03:37:02 executing program 3: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001740)) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f00000000c0), 0x21f) bind$inet6(r0, &(0x7f0000d1a000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) shutdown(r0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x4000) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20040000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x3, 0x200000) r2 = syz_open_dev$swradio(&(0x7f0000000300)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet6_buf(r2, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f00000002c0)=0x28) r3 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xa8, 0x10000) accept$unix(r3, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0xffffffffffffffea) write$P9_RWALK(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="160000006f010001000c0000000002000000000000009f8f460744eaceff007869360873d41b5a583b5da7eb7faefe2af1895db99cca04c056121996eedd3c90c570cd89be76ddfc761fb23623d3c454dafeab071071134df173dbc600000000d5000005"], 0x64) 03:37:02 executing program 4: r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f00000003c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,G\x87\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3_8\xab\x9f-h\x12\xe2\xf4km\xfes\xe0\xea4Nb]\xe5}\xc9\xb2\xd5K\\f&\xc05\xd07\x14\x9b\x99\xf7\x81^\x9e\xee', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 03:37:02 executing program 4: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001740)) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f00000000c0), 0x21f) bind$inet6(r0, &(0x7f0000d1a000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) shutdown(r0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x4000) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20040000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x3, 0x200000) r2 = syz_open_dev$swradio(&(0x7f0000000300)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet6_buf(r2, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f00000002c0)=0x28) r3 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xa8, 0x10000) accept$unix(r3, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0xffffffffffffffea) write$P9_RWALK(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="160000006f010001000c0000000002000000000000009f8f460744eaceff007869360873d41b5a583b5da7eb7faefe2af1895db99cca04c056121996eedd3c90c570cd89be76ddfc761fb23623d3c454dafeab071071134df173dbc600000000d5000005"], 0x64) 03:37:02 executing program 5: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x97d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) close(r0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) 03:37:02 executing program 5: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001740)) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f00000000c0), 0x21f) bind$inet6(r0, &(0x7f0000d1a000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) shutdown(r0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x4000) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20040000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x3, 0x200000) r2 = syz_open_dev$swradio(&(0x7f0000000300)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet6_buf(r2, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f00000002c0)=0x28) r3 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xa8, 0x10000) accept$unix(r3, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0xffffffffffffffea) write$P9_RWALK(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="160000006f010001000c0000000002000000000000009f8f460744eaceff007869360873d41b5a583b5da7eb7faefe2af1895db99cca04c056121996eedd3c90c570cd89be76ddfc761fb23623d3c454dafeab071071134df173dbc600000000d5000005"], 0x64) 03:37:02 executing program 0: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001740)) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f00000000c0), 0x21f) bind$inet6(r0, &(0x7f0000d1a000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) shutdown(r0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x4000) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20040000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x3, 0x200000) r2 = syz_open_dev$swradio(&(0x7f0000000300)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet6_buf(r2, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f00000002c0)=0x28) r3 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xa8, 0x10000) accept$unix(r3, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0xffffffffffffffea) write$P9_RWALK(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="160000006f010001000c0000000002000000000000009f8f460744eaceff007869360873d41b5a583b5da7eb7faefe2af1895db99cca04c056121996eedd3c90c570cd89be76ddfc761fb23623d3c454dafeab071071134df173dbc600000000d5000005"], 0x64) 03:37:02 executing program 2: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001740)) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f00000000c0), 0x21f) bind$inet6(r0, &(0x7f0000d1a000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) shutdown(r0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x4000) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20040000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x3, 0x200000) r2 = syz_open_dev$swradio(&(0x7f0000000300)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet6_buf(r2, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f00000002c0)=0x28) r3 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xa8, 0x10000) accept$unix(r3, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0xffffffffffffffea) write$P9_RWALK(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="160000006f010001000c0000000002000000000000009f8f460744eaceff007869360873d41b5a583b5da7eb7faefe2af1895db99cca04c056121996eedd3c90c570cd89be76ddfc761fb23623d3c454dafeab071071134df173dbc600000000d5000005"], 0x64) 03:37:03 executing program 1: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001740)) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f00000000c0), 0x21f) bind$inet6(r0, &(0x7f0000d1a000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) shutdown(r0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x4000) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20040000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x3, 0x200000) r2 = syz_open_dev$swradio(&(0x7f0000000300)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet6_buf(r2, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f00000002c0)=0x28) r3 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xa8, 0x10000) accept$unix(r3, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0xffffffffffffffea) write$P9_RWALK(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="160000006f010001000c0000000002000000000000009f8f460744eaceff007869360873d41b5a583b5da7eb7faefe2af1895db99cca04c056121996eedd3c90c570cd89be76ddfc761fb23623d3c454dafeab071071134df173dbc600000000d5000005"], 0x64) 03:37:03 executing program 3: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001740)) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f00000000c0), 0x21f) bind$inet6(r0, &(0x7f0000d1a000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) shutdown(r0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x4000) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20040000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x3, 0x200000) r2 = syz_open_dev$swradio(&(0x7f0000000300)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet6_buf(r2, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f00000002c0)=0x28) r3 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xa8, 0x10000) accept$unix(r3, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0xffffffffffffffea) write$P9_RWALK(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="160000006f010001000c0000000002000000000000009f8f460744eaceff007869360873d41b5a583b5da7eb7faefe2af1895db99cca04c056121996eedd3c90c570cd89be76ddfc761fb23623d3c454dafeab071071134df173dbc600000000d5000005"], 0x64) 03:37:03 executing program 4: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001740)) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f00000000c0), 0x21f) bind$inet6(r0, &(0x7f0000d1a000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) shutdown(r0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x4000) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20040000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x3, 0x200000) r2 = syz_open_dev$swradio(&(0x7f0000000300)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet6_buf(r2, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f00000002c0)=0x28) r3 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xa8, 0x10000) accept$unix(r3, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0xffffffffffffffea) write$P9_RWALK(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="160000006f010001000c0000000002000000000000009f8f460744eaceff007869360873d41b5a583b5da7eb7faefe2af1895db99cca04c056121996eedd3c90c570cd89be76ddfc761fb23623d3c454dafeab071071134df173dbc600000000d5000005"], 0x64) 03:37:03 executing program 5: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001740)) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f00000000c0), 0x21f) bind$inet6(r0, &(0x7f0000d1a000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) shutdown(r0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x4000) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20040000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x3, 0x200000) r2 = syz_open_dev$swradio(&(0x7f0000000300)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet6_buf(r2, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f00000002c0)=0x28) r3 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xa8, 0x10000) accept$unix(r3, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0xffffffffffffffea) write$P9_RWALK(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="160000006f010001000c0000000002000000000000009f8f460744eaceff007869360873d41b5a583b5da7eb7faefe2af1895db99cca04c056121996eedd3c90c570cd89be76ddfc761fb23623d3c454dafeab071071134df173dbc600000000d5000005"], 0x64) 03:37:03 executing program 2: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001740)) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f00000000c0), 0x21f) bind$inet6(r0, &(0x7f0000d1a000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) shutdown(r0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x4000) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20040000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x3, 0x200000) r2 = syz_open_dev$swradio(&(0x7f0000000300)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet6_buf(r2, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f00000002c0)=0x28) r3 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xa8, 0x10000) accept$unix(r3, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0xffffffffffffffea) write$P9_RWALK(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="160000006f010001000c0000000002000000000000009f8f460744eaceff007869360873d41b5a583b5da7eb7faefe2af1895db99cca04c056121996eedd3c90c570cd89be76ddfc761fb23623d3c454dafeab071071134df173dbc600000000d5000005"], 0x64) 03:37:03 executing program 1: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001740)) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f00000000c0), 0x21f) bind$inet6(r0, &(0x7f0000d1a000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) shutdown(r0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x4000) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20040000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x3, 0x200000) r2 = syz_open_dev$swradio(&(0x7f0000000300)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet6_buf(r2, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f00000002c0)=0x28) r3 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xa8, 0x10000) accept$unix(r3, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0xffffffffffffffea) write$P9_RWALK(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="160000006f010001000c0000000002000000000000009f8f460744eaceff007869360873d41b5a583b5da7eb7faefe2af1895db99cca04c056121996eedd3c90c570cd89be76ddfc761fb23623d3c454dafeab071071134df173dbc600000000d5000005"], 0x64) 03:37:03 executing program 3: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001740)) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f00000000c0), 0x21f) bind$inet6(r0, &(0x7f0000d1a000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) shutdown(r0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x4000) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20040000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x3, 0x200000) r2 = syz_open_dev$swradio(&(0x7f0000000300)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet6_buf(r2, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f00000002c0)=0x28) r3 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xa8, 0x10000) accept$unix(r3, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0xffffffffffffffea) write$P9_RWALK(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="160000006f010001000c0000000002000000000000009f8f460744eaceff007869360873d41b5a583b5da7eb7faefe2af1895db99cca04c056121996eedd3c90c570cd89be76ddfc761fb23623d3c454dafeab071071134df173dbc600000000d5000005"], 0x64) 03:37:03 executing program 4: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001740)) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f00000000c0), 0x21f) bind$inet6(r0, &(0x7f0000d1a000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) shutdown(r0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x4000) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20040000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x3, 0x200000) r2 = syz_open_dev$swradio(&(0x7f0000000300)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet6_buf(r2, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f00000002c0)=0x28) r3 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xa8, 0x10000) accept$unix(r3, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0xffffffffffffffea) write$P9_RWALK(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="160000006f010001000c0000000002000000000000009f8f460744eaceff007869360873d41b5a583b5da7eb7faefe2af1895db99cca04c056121996eedd3c90c570cd89be76ddfc761fb23623d3c454dafeab071071134df173dbc600000000d5000005"], 0x64) 03:37:03 executing program 5: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001740)) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f00000000c0), 0x21f) bind$inet6(r0, &(0x7f0000d1a000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) shutdown(r0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x4000) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20040000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x3, 0x200000) r2 = syz_open_dev$swradio(&(0x7f0000000300)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet6_buf(r2, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f00000002c0)=0x28) r3 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xa8, 0x10000) accept$unix(r3, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0xffffffffffffffea) write$P9_RWALK(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="160000006f010001000c0000000002000000000000009f8f460744eaceff007869360873d41b5a583b5da7eb7faefe2af1895db99cca04c056121996eedd3c90c570cd89be76ddfc761fb23623d3c454dafeab071071134df173dbc600000000d5000005"], 0x64) [ 348.730187] IPVS: ftp: loaded support on port[0] = 21 03:37:04 executing program 0: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001740)) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f00000000c0), 0x21f) bind$inet6(r0, &(0x7f0000d1a000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) shutdown(r0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x4000) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20040000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x3, 0x200000) r2 = syz_open_dev$swradio(&(0x7f0000000300)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet6_buf(r2, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f00000002c0)=0x28) r3 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xa8, 0x10000) accept$unix(r3, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0xffffffffffffffea) write$P9_RWALK(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="160000006f010001000c0000000002000000000000009f8f460744eaceff007869360873d41b5a583b5da7eb7faefe2af1895db99cca04c056121996eedd3c90c570cd89be76ddfc761fb23623d3c454dafeab071071134df173dbc600000000d5000005"], 0x64) 03:37:04 executing program 3: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x97d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) close(r0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) 03:37:04 executing program 1: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x97d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) close(r0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) 03:37:04 executing program 4: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x97d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) close(r0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) 03:37:04 executing program 3: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x97d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) close(r0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) 03:37:04 executing program 1: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x97d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) close(r0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) 03:37:04 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) setsockopt$rose(r0, 0x104, 0x0, 0x0, 0x27b) [ 349.780222] IPVS: ftp: loaded support on port[0] = 21 03:37:05 executing program 4: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x97d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) close(r0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) 03:37:05 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) setsockopt$rose(r0, 0x104, 0x0, 0x0, 0x27b) 03:37:05 executing program 3: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x97d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) close(r0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) 03:37:05 executing program 1: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x97d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) close(r0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) 03:37:05 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000f85fa0)={0x2, 0x4, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}]}, 0x60}}, 0x0) 03:37:05 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) setsockopt$rose(r0, 0x104, 0x0, 0x0, 0x27b) 03:37:05 executing program 4: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x97d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) close(r0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) 03:37:05 executing program 1: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) getdents(r0, 0x0, 0x11a) 03:37:05 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cdf0311cfc093a52a7d86bd10c9d68573b94531dc9cca9a4cd8c33cc", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000004400)=[{{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000004280)=""/223, 0xdf}], 0x1}}], 0x1, 0x0, 0x0) 03:37:05 executing program 3: clone(0x802102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x21) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0xdf72, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:37:05 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) setsockopt$rose(r0, 0x104, 0x0, 0x0, 0x27b) 03:37:05 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000f85fa0)={0x2, 0x4, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}]}, 0x60}}, 0x0) 03:37:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000200)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[], 0x271) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/84, 0x54}, {&(0x7f0000000340)=""/249, 0xf9}], 0x2}}], 0x1, 0x0, 0x0) 03:37:05 executing program 1: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) getdents(r0, 0x0, 0x11a) 03:37:05 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cdf0311cfc093a52a7d86bd10c9d68573b94531dc9cca9a4cd8c33cc", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000004400)=[{{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000004280)=""/223, 0xdf}], 0x1}}], 0x1, 0x0, 0x0) 03:37:05 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000f85fa0)={0x2, 0x4, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}]}, 0x60}}, 0x0) 03:37:05 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cdf0311cfc093a52a7d86bd10c9d68573b94531dc9cca9a4cd8c33cc", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000004400)=[{{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000004280)=""/223, 0xdf}], 0x1}}], 0x1, 0x0, 0x0) 03:37:05 executing program 1: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) getdents(r0, 0x0, 0x11a) 03:37:05 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cdf0311cfc093a52a7d86bd10c9d68573b94531dc9cca9a4cd8c33cc", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000004400)=[{{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000004280)=""/223, 0xdf}], 0x1}}], 0x1, 0x0, 0x0) 03:37:05 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cdf0311cfc093a52a7d86bd10c9d68573b94531dc9cca9a4cd8c33cc", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000004400)=[{{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000004280)=""/223, 0xdf}], 0x1}}], 0x1, 0x0, 0x0) 03:37:05 executing program 1: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) getdents(r0, 0x0, 0x11a) 03:37:08 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cdf0311cfc093a52a7d86bd10c9d68573b94531dc9cca9a4cd8c33cc", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000004400)=[{{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000004280)=""/223, 0xdf}], 0x1}}], 0x1, 0x0, 0x0) 03:37:08 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000f85fa0)={0x2, 0x4, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}]}, 0x60}}, 0x0) 03:37:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000200)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[], 0x271) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/84, 0x54}, {&(0x7f0000000340)=""/249, 0xf9}], 0x2}}], 0x1, 0x0, 0x0) 03:37:08 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cdf0311cfc093a52a7d86bd10c9d68573b94531dc9cca9a4cd8c33cc", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000004400)=[{{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000004280)=""/223, 0xdf}], 0x1}}], 0x1, 0x0, 0x0) 03:37:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000200)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[], 0x271) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/84, 0x54}, {&(0x7f0000000340)=""/249, 0xf9}], 0x2}}], 0x1, 0x0, 0x0) 03:37:08 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cdf0311cfc093a52a7d86bd10c9d68573b94531dc9cca9a4cd8c33cc", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000004400)=[{{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000004280)=""/223, 0xdf}], 0x1}}], 0x1, 0x0, 0x0) 03:37:08 executing program 2: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) getdents(r0, 0x0, 0x11a) 03:37:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000200)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[], 0x271) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/84, 0x54}, {&(0x7f0000000340)=""/249, 0xf9}], 0x2}}], 0x1, 0x0, 0x0) 03:37:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000200)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[], 0x271) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/84, 0x54}, {&(0x7f0000000340)=""/249, 0xf9}], 0x2}}], 0x1, 0x0, 0x0) 03:37:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x20000400, 0x0, 0x0, 0x20000620, 0x20000650], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'erspan0\x00', 'ip6_vti0\x00', 'ros\x02\x00', 'bridge_slave_1\x00', @random="1f14d2acee56", [], @dev, [], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}]}, 0x1b0) 03:37:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000200)="0adc1f123c123f319bc070") syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001240)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}, {@errors_remount='errors=remount-ro'}]}) 03:37:08 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cdf0311cfc093a52a7d86bd10c9d68573b94531dc9cca9a4cd8c33cc", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000004400)=[{{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000004280)=""/223, 0xdf}], 0x1}}], 0x1, 0x0, 0x0) 03:37:08 executing program 2: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) getdents(r0, 0x0, 0x11a) 03:37:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000200)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[], 0x271) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/84, 0x54}, {&(0x7f0000000340)=""/249, 0xf9}], 0x2}}], 0x1, 0x0, 0x0) 03:37:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000200)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[], 0x271) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/84, 0x54}, {&(0x7f0000000340)=""/249, 0xf9}], 0x2}}], 0x1, 0x0, 0x0) 03:37:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x20000400, 0x0, 0x0, 0x20000620, 0x20000650], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'erspan0\x00', 'ip6_vti0\x00', 'ros\x02\x00', 'bridge_slave_1\x00', @random="1f14d2acee56", [], @dev, [], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}]}, 0x1b0) 03:37:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000200)="0adc1f123c123f319bc070") syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001240)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}, {@errors_remount='errors=remount-ro'}]}) 03:37:08 executing program 2: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) getdents(r0, 0x0, 0x11a) 03:37:08 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cdf0311cfc093a52a7d86bd10c9d68573b94531dc9cca9a4cd8c33cc", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000004400)=[{{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000004280)=""/223, 0xdf}], 0x1}}], 0x1, 0x0, 0x0) 03:37:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x20000400, 0x0, 0x0, 0x20000620, 0x20000650], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'erspan0\x00', 'ip6_vti0\x00', 'ros\x02\x00', 'bridge_slave_1\x00', @random="1f14d2acee56", [], @dev, [], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}]}, 0x1b0) 03:37:08 executing program 1: syz_execute_func(&(0x7f0000001280)="0fbecc91cd80d3d369ef69dc00d9d0d0c44139fd5bf930c7c7e4c653fbc461f85a6136ace468f4a95ff9c44149f2168f4808eebce00000802000c421fc51c1ea01ef8f8920010e4545186746c4c10211cf26660fe98d0d000000c4e2e591a4fa0200000026ca400f0d18a018a0fe5ff6e3df646736676666430fefb3000000000804f4f30f1a12e250500f7c29") 03:37:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000200)="0adc1f123c123f319bc070") syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001240)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}, {@errors_remount='errors=remount-ro'}]}) 03:37:09 executing program 4: syz_open_dev$binder(&(0x7f00000008c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000100)={0x4, 0x0, &(0x7f0000000000)=[@enter_looper], 0x1, 0x500000000000000, &(0x7f0000000b80)='\x00'}) 03:37:09 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x90c, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x380000, @loopback}, 0x1c) sendmmsg$alg(r0, &(0x7f0000002500)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=[@assoc={0x18, 0x29, 0xb}], 0x18}], 0x3, 0x0) 03:37:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x6, 0x7, 0x0, 0x3}}) 03:37:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x20000400, 0x0, 0x0, 0x20000620, 0x20000650], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'erspan0\x00', 'ip6_vti0\x00', 'ros\x02\x00', 'bridge_slave_1\x00', @random="1f14d2acee56", [], @dev, [], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}]}, 0x1b0) [ 353.756138] audit: type=1400 audit(2000000229.076:132): avc: denied { map } for pid=19425 comm="syz-executor.4" path="/dev/binder0" dev="devtmpfs" ino=14693 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 03:37:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000200)="0adc1f123c123f319bc070") syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001240)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}, {@errors_remount='errors=remount-ro'}]}) 03:37:09 executing program 1: syz_execute_func(&(0x7f0000001280)="0fbecc91cd80d3d369ef69dc00d9d0d0c44139fd5bf930c7c7e4c653fbc461f85a6136ace468f4a95ff9c44149f2168f4808eebce00000802000c421fc51c1ea01ef8f8920010e4545186746c4c10211cf26660fe98d0d000000c4e2e591a4fa0200000026ca400f0d18a018a0fe5ff6e3df646736676666430fefb3000000000804f4f30f1a12e250500f7c29") 03:37:09 executing program 5: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000280)={0xffffffffffffff9c}) r0 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x6, 0x20000) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000040)={0xfffffffffffffff7, "9ab64d7cd71177bccc03e97f0b7a2542819e49f85112e6505c34d5aae485804a", 0x3, 0x1}) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) ioctl$VIDIOC_S_OUTPUT(0xffffffffffffffff, 0xc004562f, &(0x7f0000000340)=0x2674) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = semget$private(0x0, 0x2, 0x0) semctl$IPC_INFO(r3, 0x4, 0x3, &(0x7f0000000200)=""/81) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) unshare(0x40000000) getsockopt$inet6_buf(r1, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) r4 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x0, 0x10000) accept$unix(r4, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f00000000c0)={0x0, 0x10000, 0x6, 0x2, 0xd}) sendmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000400)="1d367a56f5c42c3c55049d2090b3b67c6217944c321b2fb7a7279ff6002d771186d421f3e6fb1470d0416a6bf2d44f85002dac12c4669df60ef5216e6dfdc5ee8bdbaf6ae7c0996d7a329b7bc3889ef618feb869b3e7aea117d9f4f3c15ab7ede488bb51", 0x64}], 0x1}, 0x4) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f00000001c0)) 03:37:09 executing program 1: syz_execute_func(&(0x7f0000001280)="0fbecc91cd80d3d369ef69dc00d9d0d0c44139fd5bf930c7c7e4c653fbc461f85a6136ace468f4a95ff9c44149f2168f4808eebce00000802000c421fc51c1ea01ef8f8920010e4545186746c4c10211cf26660fe98d0d000000c4e2e591a4fa0200000026ca400f0d18a018a0fe5ff6e3df646736676666430fefb3000000000804f4f30f1a12e250500f7c29") [ 353.845489] audit: type=1400 audit(2000000229.136:133): avc: denied { set_context_mgr } for pid=19425 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 03:37:09 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x90c, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x380000, @loopback}, 0x1c) sendmmsg$alg(r0, &(0x7f0000002500)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=[@assoc={0x18, 0x29, 0xb}], 0x18}], 0x3, 0x0) 03:37:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x6, 0x7, 0x0, 0x3}}) 03:37:09 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x90c, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x380000, @loopback}, 0x1c) sendmmsg$alg(r0, &(0x7f0000002500)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=[@assoc={0x18, 0x29, 0xb}], 0x18}], 0x3, 0x0) 03:37:09 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x90c, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x380000, @loopback}, 0x1c) sendmmsg$alg(r0, &(0x7f0000002500)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=[@assoc={0x18, 0x29, 0xb}], 0x18}], 0x3, 0x0) 03:37:09 executing program 4: syz_open_dev$binder(&(0x7f00000008c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000100)={0x4, 0x0, &(0x7f0000000000)=[@enter_looper], 0x1, 0x500000000000000, &(0x7f0000000b80)='\x00'}) 03:37:09 executing program 1: syz_execute_func(&(0x7f0000001280)="0fbecc91cd80d3d369ef69dc00d9d0d0c44139fd5bf930c7c7e4c653fbc461f85a6136ace468f4a95ff9c44149f2168f4808eebce00000802000c421fc51c1ea01ef8f8920010e4545186746c4c10211cf26660fe98d0d000000c4e2e591a4fa0200000026ca400f0d18a018a0fe5ff6e3df646736676666430fefb3000000000804f4f30f1a12e250500f7c29") 03:37:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x6, 0x7, 0x0, 0x3}}) 03:37:09 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x90c, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x380000, @loopback}, 0x1c) sendmmsg$alg(r0, &(0x7f0000002500)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=[@assoc={0x18, 0x29, 0xb}], 0x18}], 0x3, 0x0) 03:37:09 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x90c, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x380000, @loopback}, 0x1c) sendmmsg$alg(r0, &(0x7f0000002500)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=[@assoc={0x18, 0x29, 0xb}], 0x18}], 0x3, 0x0) 03:37:09 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x90c, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x380000, @loopback}, 0x1c) sendmmsg$alg(r0, &(0x7f0000002500)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=[@assoc={0x18, 0x29, 0xb}], 0x18}], 0x3, 0x0) [ 354.701129] IPVS: ftp: loaded support on port[0] = 21 03:37:10 executing program 5: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000280)={0xffffffffffffff9c}) r0 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x6, 0x20000) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000040)={0xfffffffffffffff7, "9ab64d7cd71177bccc03e97f0b7a2542819e49f85112e6505c34d5aae485804a", 0x3, 0x1}) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) ioctl$VIDIOC_S_OUTPUT(0xffffffffffffffff, 0xc004562f, &(0x7f0000000340)=0x2674) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = semget$private(0x0, 0x2, 0x0) semctl$IPC_INFO(r3, 0x4, 0x3, &(0x7f0000000200)=""/81) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) unshare(0x40000000) getsockopt$inet6_buf(r1, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) r4 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x0, 0x10000) accept$unix(r4, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f00000000c0)={0x0, 0x10000, 0x6, 0x2, 0xd}) sendmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000400)="1d367a56f5c42c3c55049d2090b3b67c6217944c321b2fb7a7279ff6002d771186d421f3e6fb1470d0416a6bf2d44f85002dac12c4669df60ef5216e6dfdc5ee8bdbaf6ae7c0996d7a329b7bc3889ef618feb869b3e7aea117d9f4f3c15ab7ede488bb51", 0x64}], 0x1}, 0x4) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f00000001c0)) 03:37:10 executing program 2: syz_open_dev$binder(&(0x7f00000008c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000100)={0x4, 0x0, &(0x7f0000000000)=[@enter_looper], 0x1, 0x500000000000000, &(0x7f0000000b80)='\x00'}) 03:37:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x6, 0x7, 0x0, 0x3}}) 03:37:10 executing program 1: syz_open_dev$binder(&(0x7f00000008c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000100)={0x4, 0x0, &(0x7f0000000000)=[@enter_looper], 0x1, 0x500000000000000, &(0x7f0000000b80)='\x00'}) 03:37:10 executing program 0: syz_open_dev$binder(&(0x7f00000008c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000100)={0x4, 0x0, &(0x7f0000000000)=[@enter_looper], 0x1, 0x500000000000000, &(0x7f0000000b80)='\x00'}) [ 355.004734] binder: BINDER_SET_CONTEXT_MGR already set [ 355.011871] binder: 19491:19496 ioctl 40046207 0 returned -16 [ 355.025691] binder: BINDER_SET_CONTEXT_MGR already set [ 355.031881] binder: 19493:19498 ioctl 40046207 0 returned -16 [ 355.047853] binder: BINDER_SET_CONTEXT_MGR already set 03:37:10 executing program 3: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000280)={0xffffffffffffff9c}) r0 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x6, 0x20000) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000040)={0xfffffffffffffff7, "9ab64d7cd71177bccc03e97f0b7a2542819e49f85112e6505c34d5aae485804a", 0x3, 0x1}) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) ioctl$VIDIOC_S_OUTPUT(0xffffffffffffffff, 0xc004562f, &(0x7f0000000340)=0x2674) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = semget$private(0x0, 0x2, 0x0) semctl$IPC_INFO(r3, 0x4, 0x3, &(0x7f0000000200)=""/81) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) unshare(0x40000000) getsockopt$inet6_buf(r1, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) r4 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x0, 0x10000) accept$unix(r4, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f00000000c0)={0x0, 0x10000, 0x6, 0x2, 0xd}) sendmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000400)="1d367a56f5c42c3c55049d2090b3b67c6217944c321b2fb7a7279ff6002d771186d421f3e6fb1470d0416a6bf2d44f85002dac12c4669df60ef5216e6dfdc5ee8bdbaf6ae7c0996d7a329b7bc3889ef618feb869b3e7aea117d9f4f3c15ab7ede488bb51", 0x64}], 0x1}, 0x4) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f00000001c0)) [ 355.053628] binder: 19494:19499 ioctl 40046207 0 returned -16 03:37:10 executing program 4: syz_open_dev$binder(&(0x7f00000008c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000100)={0x4, 0x0, &(0x7f0000000000)=[@enter_looper], 0x1, 0x500000000000000, &(0x7f0000000b80)='\x00'}) 03:37:11 executing program 2: syz_open_dev$binder(&(0x7f00000008c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000100)={0x4, 0x0, &(0x7f0000000000)=[@enter_looper], 0x1, 0x500000000000000, &(0x7f0000000b80)='\x00'}) 03:37:11 executing program 5: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000280)={0xffffffffffffff9c}) r0 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x6, 0x20000) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000040)={0xfffffffffffffff7, "9ab64d7cd71177bccc03e97f0b7a2542819e49f85112e6505c34d5aae485804a", 0x3, 0x1}) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) ioctl$VIDIOC_S_OUTPUT(0xffffffffffffffff, 0xc004562f, &(0x7f0000000340)=0x2674) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = semget$private(0x0, 0x2, 0x0) semctl$IPC_INFO(r3, 0x4, 0x3, &(0x7f0000000200)=""/81) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) unshare(0x40000000) getsockopt$inet6_buf(r1, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) r4 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x0, 0x10000) accept$unix(r4, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f00000000c0)={0x0, 0x10000, 0x6, 0x2, 0xd}) sendmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000400)="1d367a56f5c42c3c55049d2090b3b67c6217944c321b2fb7a7279ff6002d771186d421f3e6fb1470d0416a6bf2d44f85002dac12c4669df60ef5216e6dfdc5ee8bdbaf6ae7c0996d7a329b7bc3889ef618feb869b3e7aea117d9f4f3c15ab7ede488bb51", 0x64}], 0x1}, 0x4) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f00000001c0)) 03:37:11 executing program 1: syz_open_dev$binder(&(0x7f00000008c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000100)={0x4, 0x0, &(0x7f0000000000)=[@enter_looper], 0x1, 0x500000000000000, &(0x7f0000000b80)='\x00'}) 03:37:11 executing program 3: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000280)={0xffffffffffffff9c}) r0 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x6, 0x20000) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000040)={0xfffffffffffffff7, "9ab64d7cd71177bccc03e97f0b7a2542819e49f85112e6505c34d5aae485804a", 0x3, 0x1}) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) ioctl$VIDIOC_S_OUTPUT(0xffffffffffffffff, 0xc004562f, &(0x7f0000000340)=0x2674) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = semget$private(0x0, 0x2, 0x0) semctl$IPC_INFO(r3, 0x4, 0x3, &(0x7f0000000200)=""/81) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) unshare(0x40000000) getsockopt$inet6_buf(r1, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) r4 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x0, 0x10000) accept$unix(r4, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f00000000c0)={0x0, 0x10000, 0x6, 0x2, 0xd}) sendmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000400)="1d367a56f5c42c3c55049d2090b3b67c6217944c321b2fb7a7279ff6002d771186d421f3e6fb1470d0416a6bf2d44f85002dac12c4669df60ef5216e6dfdc5ee8bdbaf6ae7c0996d7a329b7bc3889ef618feb869b3e7aea117d9f4f3c15ab7ede488bb51", 0x64}], 0x1}, 0x4) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f00000001c0)) 03:37:11 executing program 0: syz_open_dev$binder(&(0x7f00000008c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000100)={0x4, 0x0, &(0x7f0000000000)=[@enter_looper], 0x1, 0x500000000000000, &(0x7f0000000b80)='\x00'}) [ 355.890624] binder: BINDER_SET_CONTEXT_MGR already set [ 355.936404] binder: 19510:19513 ioctl 40046207 0 returned -16 [ 355.946945] binder: BINDER_SET_CONTEXT_MGR already set [ 355.966852] binder: 19514:19520 ioctl 40046207 0 returned -16 03:37:11 executing program 2: syz_open_dev$binder(&(0x7f00000008c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000100)={0x4, 0x0, &(0x7f0000000000)=[@enter_looper], 0x1, 0x500000000000000, &(0x7f0000000b80)='\x00'}) [ 355.998279] binder: BINDER_SET_CONTEXT_MGR already set [ 356.004382] binder: 19519:19524 ioctl 40046207 0 returned -16 [ 356.047775] binder: BINDER_SET_CONTEXT_MGR already set [ 356.053597] binder: 19527:19529 ioctl 40046207 0 returned -16 03:37:11 executing program 4: syz_open_dev$binder(&(0x7f00000008c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000100)={0x4, 0x0, &(0x7f0000000000)=[@enter_looper], 0x1, 0x500000000000000, &(0x7f0000000b80)='\x00'}) 03:37:12 executing program 5: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000280)={0xffffffffffffff9c}) r0 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x6, 0x20000) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000040)={0xfffffffffffffff7, "9ab64d7cd71177bccc03e97f0b7a2542819e49f85112e6505c34d5aae485804a", 0x3, 0x1}) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) ioctl$VIDIOC_S_OUTPUT(0xffffffffffffffff, 0xc004562f, &(0x7f0000000340)=0x2674) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = semget$private(0x0, 0x2, 0x0) semctl$IPC_INFO(r3, 0x4, 0x3, &(0x7f0000000200)=""/81) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) unshare(0x40000000) getsockopt$inet6_buf(r1, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) r4 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x0, 0x10000) accept$unix(r4, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f00000000c0)={0x0, 0x10000, 0x6, 0x2, 0xd}) sendmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000400)="1d367a56f5c42c3c55049d2090b3b67c6217944c321b2fb7a7279ff6002d771186d421f3e6fb1470d0416a6bf2d44f85002dac12c4669df60ef5216e6dfdc5ee8bdbaf6ae7c0996d7a329b7bc3889ef618feb869b3e7aea117d9f4f3c15ab7ede488bb51", 0x64}], 0x1}, 0x4) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f00000001c0)) 03:37:12 executing program 3: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000280)={0xffffffffffffff9c}) r0 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x6, 0x20000) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000040)={0xfffffffffffffff7, "9ab64d7cd71177bccc03e97f0b7a2542819e49f85112e6505c34d5aae485804a", 0x3, 0x1}) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) ioctl$VIDIOC_S_OUTPUT(0xffffffffffffffff, 0xc004562f, &(0x7f0000000340)=0x2674) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = semget$private(0x0, 0x2, 0x0) semctl$IPC_INFO(r3, 0x4, 0x3, &(0x7f0000000200)=""/81) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) unshare(0x40000000) getsockopt$inet6_buf(r1, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) r4 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x0, 0x10000) accept$unix(r4, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f00000000c0)={0x0, 0x10000, 0x6, 0x2, 0xd}) sendmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000400)="1d367a56f5c42c3c55049d2090b3b67c6217944c321b2fb7a7279ff6002d771186d421f3e6fb1470d0416a6bf2d44f85002dac12c4669df60ef5216e6dfdc5ee8bdbaf6ae7c0996d7a329b7bc3889ef618feb869b3e7aea117d9f4f3c15ab7ede488bb51", 0x64}], 0x1}, 0x4) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f00000001c0)) 03:37:12 executing program 1: syz_open_dev$binder(&(0x7f00000008c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000100)={0x4, 0x0, &(0x7f0000000000)=[@enter_looper], 0x1, 0x500000000000000, &(0x7f0000000b80)='\x00'}) 03:37:12 executing program 0: syz_open_dev$binder(&(0x7f00000008c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000100)={0x4, 0x0, &(0x7f0000000000)=[@enter_looper], 0x1, 0x500000000000000, &(0x7f0000000b80)='\x00'}) 03:37:12 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000280)={0xffffffffffffff9c}) r0 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x6, 0x20000) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000040)={0xfffffffffffffff7, "9ab64d7cd71177bccc03e97f0b7a2542819e49f85112e6505c34d5aae485804a", 0x3, 0x1}) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) ioctl$VIDIOC_S_OUTPUT(0xffffffffffffffff, 0xc004562f, &(0x7f0000000340)=0x2674) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = semget$private(0x0, 0x2, 0x0) semctl$IPC_INFO(r3, 0x4, 0x3, &(0x7f0000000200)=""/81) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) unshare(0x40000000) getsockopt$inet6_buf(r1, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) r4 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x0, 0x10000) accept$unix(r4, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f00000000c0)={0x0, 0x10000, 0x6, 0x2, 0xd}) sendmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000400)="1d367a56f5c42c3c55049d2090b3b67c6217944c321b2fb7a7279ff6002d771186d421f3e6fb1470d0416a6bf2d44f85002dac12c4669df60ef5216e6dfdc5ee8bdbaf6ae7c0996d7a329b7bc3889ef618feb869b3e7aea117d9f4f3c15ab7ede488bb51", 0x64}], 0x1}, 0x4) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f00000001c0)) [ 356.843890] binder: BINDER_SET_CONTEXT_MGR already set [ 356.849584] binder: 19539:19542 ioctl 40046207 0 returned -16 [ 356.878158] binder: BINDER_SET_CONTEXT_MGR already set [ 356.883930] binder: 19541:19545 ioctl 40046207 0 returned -16 03:37:12 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000280)={0xffffffffffffff9c}) r0 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x6, 0x20000) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000040)={0xfffffffffffffff7, "9ab64d7cd71177bccc03e97f0b7a2542819e49f85112e6505c34d5aae485804a", 0x3, 0x1}) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) ioctl$VIDIOC_S_OUTPUT(0xffffffffffffffff, 0xc004562f, &(0x7f0000000340)=0x2674) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = semget$private(0x0, 0x2, 0x0) semctl$IPC_INFO(r3, 0x4, 0x3, &(0x7f0000000200)=""/81) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) unshare(0x40000000) getsockopt$inet6_buf(r1, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) r4 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x0, 0x10000) accept$unix(r4, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f00000000c0)={0x0, 0x10000, 0x6, 0x2, 0xd}) sendmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000400)="1d367a56f5c42c3c55049d2090b3b67c6217944c321b2fb7a7279ff6002d771186d421f3e6fb1470d0416a6bf2d44f85002dac12c4669df60ef5216e6dfdc5ee8bdbaf6ae7c0996d7a329b7bc3889ef618feb869b3e7aea117d9f4f3c15ab7ede488bb51", 0x64}], 0x1}, 0x4) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f00000001c0)) 03:37:12 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000280)={0xffffffffffffff9c}) r0 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x6, 0x20000) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000040)={0xfffffffffffffff7, "9ab64d7cd71177bccc03e97f0b7a2542819e49f85112e6505c34d5aae485804a", 0x3, 0x1}) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) ioctl$VIDIOC_S_OUTPUT(0xffffffffffffffff, 0xc004562f, &(0x7f0000000340)=0x2674) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = semget$private(0x0, 0x2, 0x0) semctl$IPC_INFO(r3, 0x4, 0x3, &(0x7f0000000200)=""/81) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) unshare(0x40000000) getsockopt$inet6_buf(r1, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) r4 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x0, 0x10000) accept$unix(r4, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f00000000c0)={0x0, 0x10000, 0x6, 0x2, 0xd}) sendmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000400)="1d367a56f5c42c3c55049d2090b3b67c6217944c321b2fb7a7279ff6002d771186d421f3e6fb1470d0416a6bf2d44f85002dac12c4669df60ef5216e6dfdc5ee8bdbaf6ae7c0996d7a329b7bc3889ef618feb869b3e7aea117d9f4f3c15ab7ede488bb51", 0x64}], 0x1}, 0x4) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f00000001c0)) 03:37:13 executing program 5: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000280)={0xffffffffffffff9c}) r0 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x6, 0x20000) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000040)={0xfffffffffffffff7, "9ab64d7cd71177bccc03e97f0b7a2542819e49f85112e6505c34d5aae485804a", 0x3, 0x1}) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) ioctl$VIDIOC_S_OUTPUT(0xffffffffffffffff, 0xc004562f, &(0x7f0000000340)=0x2674) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = semget$private(0x0, 0x2, 0x0) semctl$IPC_INFO(r3, 0x4, 0x3, &(0x7f0000000200)=""/81) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) unshare(0x40000000) getsockopt$inet6_buf(r1, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) r4 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x0, 0x10000) accept$unix(r4, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f00000000c0)={0x0, 0x10000, 0x6, 0x2, 0xd}) sendmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000400)="1d367a56f5c42c3c55049d2090b3b67c6217944c321b2fb7a7279ff6002d771186d421f3e6fb1470d0416a6bf2d44f85002dac12c4669df60ef5216e6dfdc5ee8bdbaf6ae7c0996d7a329b7bc3889ef618feb869b3e7aea117d9f4f3c15ab7ede488bb51", 0x64}], 0x1}, 0x4) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f00000001c0)) 03:37:13 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x90c, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x380000, @loopback}, 0x1c) sendmmsg$alg(r0, &(0x7f0000002500)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=[@assoc={0x18, 0x29, 0xb}], 0x18}], 0x3, 0x0) 03:37:13 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000280)={0xffffffffffffff9c}) r0 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x6, 0x20000) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000040)={0xfffffffffffffff7, "9ab64d7cd71177bccc03e97f0b7a2542819e49f85112e6505c34d5aae485804a", 0x3, 0x1}) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) ioctl$VIDIOC_S_OUTPUT(0xffffffffffffffff, 0xc004562f, &(0x7f0000000340)=0x2674) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = semget$private(0x0, 0x2, 0x0) semctl$IPC_INFO(r3, 0x4, 0x3, &(0x7f0000000200)=""/81) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) unshare(0x40000000) getsockopt$inet6_buf(r1, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) r4 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x0, 0x10000) accept$unix(r4, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f00000000c0)={0x0, 0x10000, 0x6, 0x2, 0xd}) sendmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000400)="1d367a56f5c42c3c55049d2090b3b67c6217944c321b2fb7a7279ff6002d771186d421f3e6fb1470d0416a6bf2d44f85002dac12c4669df60ef5216e6dfdc5ee8bdbaf6ae7c0996d7a329b7bc3889ef618feb869b3e7aea117d9f4f3c15ab7ede488bb51", 0x64}], 0x1}, 0x4) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f00000001c0)) 03:37:13 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x90c, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x380000, @loopback}, 0x1c) sendmmsg$alg(r0, &(0x7f0000002500)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=[@assoc={0x18, 0x29, 0xb}], 0x18}], 0x3, 0x0) 03:37:13 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x90c, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x380000, @loopback}, 0x1c) sendmmsg$alg(r0, &(0x7f0000002500)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=[@assoc={0x18, 0x29, 0xb}], 0x18}], 0x3, 0x0) 03:37:13 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x90c, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x380000, @loopback}, 0x1c) sendmmsg$alg(r0, &(0x7f0000002500)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=[@assoc={0x18, 0x29, 0xb}], 0x18}], 0x3, 0x0) [ 357.890412] IPVS: ftp: loaded support on port[0] = 21 03:37:13 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000280)={0xffffffffffffff9c}) r0 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x6, 0x20000) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000040)={0xfffffffffffffff7, "9ab64d7cd71177bccc03e97f0b7a2542819e49f85112e6505c34d5aae485804a", 0x3, 0x1}) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) ioctl$VIDIOC_S_OUTPUT(0xffffffffffffffff, 0xc004562f, &(0x7f0000000340)=0x2674) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = semget$private(0x0, 0x2, 0x0) semctl$IPC_INFO(r3, 0x4, 0x3, &(0x7f0000000200)=""/81) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) unshare(0x40000000) getsockopt$inet6_buf(r1, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) r4 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x0, 0x10000) accept$unix(r4, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f00000000c0)={0x0, 0x10000, 0x6, 0x2, 0xd}) sendmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000400)="1d367a56f5c42c3c55049d2090b3b67c6217944c321b2fb7a7279ff6002d771186d421f3e6fb1470d0416a6bf2d44f85002dac12c4669df60ef5216e6dfdc5ee8bdbaf6ae7c0996d7a329b7bc3889ef618feb869b3e7aea117d9f4f3c15ab7ede488bb51", 0x64}], 0x1}, 0x4) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f00000001c0)) 03:37:13 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x90c, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x380000, @loopback}, 0x1c) sendmmsg$alg(r0, &(0x7f0000002500)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=[@assoc={0x18, 0x29, 0xb}], 0x18}], 0x3, 0x0) 03:37:13 executing program 3: r0 = socket(0x10, 0x1000040000000003, 0x0) write(r0, &(0x7f00000000c0)="22000000140007058d000009004c030402080313010000000800020041080ae376ab", 0x22) 03:37:13 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x90c, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x380000, @loopback}, 0x1c) sendmmsg$alg(r0, &(0x7f0000002500)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=[@assoc={0x18, 0x29, 0xb}], 0x18}], 0x3, 0x0) 03:37:13 executing program 3: r0 = socket(0x10, 0x1000040000000003, 0x0) write(r0, &(0x7f00000000c0)="22000000140007058d000009004c030402080313010000000800020041080ae376ab", 0x22) [ 358.226748] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.3'. [ 358.279085] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.3'. 03:37:13 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000280)={0xffffffffffffff9c}) r0 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x6, 0x20000) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000040)={0xfffffffffffffff7, "9ab64d7cd71177bccc03e97f0b7a2542819e49f85112e6505c34d5aae485804a", 0x3, 0x1}) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) ioctl$VIDIOC_S_OUTPUT(0xffffffffffffffff, 0xc004562f, &(0x7f0000000340)=0x2674) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = semget$private(0x0, 0x2, 0x0) semctl$IPC_INFO(r3, 0x4, 0x3, &(0x7f0000000200)=""/81) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) unshare(0x40000000) getsockopt$inet6_buf(r1, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) r4 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x0, 0x10000) accept$unix(r4, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f00000000c0)={0x0, 0x10000, 0x6, 0x2, 0xd}) sendmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000400)="1d367a56f5c42c3c55049d2090b3b67c6217944c321b2fb7a7279ff6002d771186d421f3e6fb1470d0416a6bf2d44f85002dac12c4669df60ef5216e6dfdc5ee8bdbaf6ae7c0996d7a329b7bc3889ef618feb869b3e7aea117d9f4f3c15ab7ede488bb51", 0x64}], 0x1}, 0x4) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f00000001c0)) [ 358.490647] IPVS: ftp: loaded support on port[0] = 21 03:37:14 executing program 5: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000280)={0xffffffffffffff9c}) r0 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x6, 0x20000) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000040)={0xfffffffffffffff7, "9ab64d7cd71177bccc03e97f0b7a2542819e49f85112e6505c34d5aae485804a", 0x3, 0x1}) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) ioctl$VIDIOC_S_OUTPUT(0xffffffffffffffff, 0xc004562f, &(0x7f0000000340)=0x2674) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = semget$private(0x0, 0x2, 0x0) semctl$IPC_INFO(r3, 0x4, 0x3, &(0x7f0000000200)=""/81) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) unshare(0x40000000) getsockopt$inet6_buf(r1, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) r4 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x0, 0x10000) accept$unix(r4, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f00000000c0)={0x0, 0x10000, 0x6, 0x2, 0xd}) sendmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000400)="1d367a56f5c42c3c55049d2090b3b67c6217944c321b2fb7a7279ff6002d771186d421f3e6fb1470d0416a6bf2d44f85002dac12c4669df60ef5216e6dfdc5ee8bdbaf6ae7c0996d7a329b7bc3889ef618feb869b3e7aea117d9f4f3c15ab7ede488bb51", 0x64}], 0x1}, 0x4) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f00000001c0)) 03:37:14 executing program 0: r0 = socket$inet(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000240)="4c0000001200ff095ffefd956fa283b724a6002200000000000000683540150024001d001fc41180b598bc593ab6821148a710de33a49868c62b2ca654a6613b6aabf35d0f81000000000000", 0x4c}], 0x1}, 0x0) 03:37:14 executing program 3: r0 = socket(0x10, 0x1000040000000003, 0x0) write(r0, &(0x7f00000000c0)="22000000140007058d000009004c030402080313010000000800020041080ae376ab", 0x22) 03:37:14 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000280)={0xffffffffffffff9c}) r0 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x6, 0x20000) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000040)={0xfffffffffffffff7, "9ab64d7cd71177bccc03e97f0b7a2542819e49f85112e6505c34d5aae485804a", 0x3, 0x1}) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) ioctl$VIDIOC_S_OUTPUT(0xffffffffffffffff, 0xc004562f, &(0x7f0000000340)=0x2674) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = semget$private(0x0, 0x2, 0x0) semctl$IPC_INFO(r3, 0x4, 0x3, &(0x7f0000000200)=""/81) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) unshare(0x40000000) getsockopt$inet6_buf(r1, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) r4 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x0, 0x10000) accept$unix(r4, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f00000000c0)={0x0, 0x10000, 0x6, 0x2, 0xd}) sendmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000400)="1d367a56f5c42c3c55049d2090b3b67c6217944c321b2fb7a7279ff6002d771186d421f3e6fb1470d0416a6bf2d44f85002dac12c4669df60ef5216e6dfdc5ee8bdbaf6ae7c0996d7a329b7bc3889ef618feb869b3e7aea117d9f4f3c15ab7ede488bb51", 0x64}], 0x1}, 0x4) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f00000001c0)) 03:37:14 executing program 3: r0 = socket(0x10, 0x1000040000000003, 0x0) write(r0, &(0x7f00000000c0)="22000000140007058d000009004c030402080313010000000800020041080ae376ab", 0x22) [ 358.867411] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.3'. 03:37:14 executing program 0: r0 = socket$inet(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000240)="4c0000001200ff095ffefd956fa283b724a6002200000000000000683540150024001d001fc41180b598bc593ab6821148a710de33a49868c62b2ca654a6613b6aabf35d0f81000000000000", 0x4c}], 0x1}, 0x0) [ 358.929916] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.3'. 03:37:14 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000280)={0xffffffffffffff9c}) r0 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x6, 0x20000) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000040)={0xfffffffffffffff7, "9ab64d7cd71177bccc03e97f0b7a2542819e49f85112e6505c34d5aae485804a", 0x3, 0x1}) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) ioctl$VIDIOC_S_OUTPUT(0xffffffffffffffff, 0xc004562f, &(0x7f0000000340)=0x2674) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = semget$private(0x0, 0x2, 0x0) semctl$IPC_INFO(r3, 0x4, 0x3, &(0x7f0000000200)=""/81) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) unshare(0x40000000) getsockopt$inet6_buf(r1, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) r4 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x0, 0x10000) accept$unix(r4, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f00000000c0)={0x0, 0x10000, 0x6, 0x2, 0xd}) sendmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000400)="1d367a56f5c42c3c55049d2090b3b67c6217944c321b2fb7a7279ff6002d771186d421f3e6fb1470d0416a6bf2d44f85002dac12c4669df60ef5216e6dfdc5ee8bdbaf6ae7c0996d7a329b7bc3889ef618feb869b3e7aea117d9f4f3c15ab7ede488bb51", 0x64}], 0x1}, 0x4) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f00000001c0)) 03:37:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndmidi(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000040)={0x10, 0xf0ffffff00000f00}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x48, 0x14, 0x207, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}, [@nested={0x0, 0x0, [@typed={0x300, 0x0, @fd}]}]}, 0x24c}}, 0x0) 03:37:14 executing program 0: r0 = socket$inet(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000240)="4c0000001200ff095ffefd956fa283b724a6002200000000000000683540150024001d001fc41180b598bc593ab6821148a710de33a49868c62b2ca654a6613b6aabf35d0f81000000000000", 0x4c}], 0x1}, 0x0) 03:37:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndmidi(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000040)={0x10, 0xf0ffffff00000f00}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x48, 0x14, 0x207, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}, [@nested={0x0, 0x0, [@typed={0x300, 0x0, @fd}]}]}, 0x24c}}, 0x0) 03:37:14 executing program 0: r0 = socket$inet(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000240)="4c0000001200ff095ffefd956fa283b724a6002200000000000000683540150024001d001fc41180b598bc593ab6821148a710de33a49868c62b2ca654a6613b6aabf35d0f81000000000000", 0x4c}], 0x1}, 0x0) 03:37:14 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000280)={0xffffffffffffff9c}) r0 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x6, 0x20000) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000040)={0xfffffffffffffff7, "9ab64d7cd71177bccc03e97f0b7a2542819e49f85112e6505c34d5aae485804a", 0x3, 0x1}) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) ioctl$VIDIOC_S_OUTPUT(0xffffffffffffffff, 0xc004562f, &(0x7f0000000340)=0x2674) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = semget$private(0x0, 0x2, 0x0) semctl$IPC_INFO(r3, 0x4, 0x3, &(0x7f0000000200)=""/81) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) unshare(0x40000000) getsockopt$inet6_buf(r1, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) r4 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x0, 0x10000) accept$unix(r4, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f00000000c0)={0x0, 0x10000, 0x6, 0x2, 0xd}) sendmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000400)="1d367a56f5c42c3c55049d2090b3b67c6217944c321b2fb7a7279ff6002d771186d421f3e6fb1470d0416a6bf2d44f85002dac12c4669df60ef5216e6dfdc5ee8bdbaf6ae7c0996d7a329b7bc3889ef618feb869b3e7aea117d9f4f3c15ab7ede488bb51", 0x64}], 0x1}, 0x4) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f00000001c0)) 03:37:15 executing program 5: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000280)={0xffffffffffffff9c}) r0 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x6, 0x20000) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000040)={0xfffffffffffffff7, "9ab64d7cd71177bccc03e97f0b7a2542819e49f85112e6505c34d5aae485804a", 0x3, 0x1}) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) ioctl$VIDIOC_S_OUTPUT(0xffffffffffffffff, 0xc004562f, &(0x7f0000000340)=0x2674) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = semget$private(0x0, 0x2, 0x0) semctl$IPC_INFO(r3, 0x4, 0x3, &(0x7f0000000200)=""/81) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) unshare(0x40000000) getsockopt$inet6_buf(r1, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) r4 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x0, 0x10000) accept$unix(r4, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f00000000c0)={0x0, 0x10000, 0x6, 0x2, 0xd}) sendmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000400)="1d367a56f5c42c3c55049d2090b3b67c6217944c321b2fb7a7279ff6002d771186d421f3e6fb1470d0416a6bf2d44f85002dac12c4669df60ef5216e6dfdc5ee8bdbaf6ae7c0996d7a329b7bc3889ef618feb869b3e7aea117d9f4f3c15ab7ede488bb51", 0x64}], 0x1}, 0x4) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f00000001c0)) 03:37:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndmidi(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000040)={0x10, 0xf0ffffff00000f00}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x48, 0x14, 0x207, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}, [@nested={0x0, 0x0, [@typed={0x300, 0x0, @fd}]}]}, 0x24c}}, 0x0) 03:37:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndmidi(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000040)={0x10, 0xf0ffffff00000f00}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x48, 0x14, 0x207, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}, [@nested={0x0, 0x0, [@typed={0x300, 0x0, @fd}]}]}, 0x24c}}, 0x0) 03:37:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndmidi(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000040)={0x10, 0xf0ffffff00000f00}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x48, 0x14, 0x207, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}, [@nested={0x0, 0x0, [@typed={0x300, 0x0, @fd}]}]}, 0x24c}}, 0x0) 03:37:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndmidi(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000040)={0x10, 0xf0ffffff00000f00}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x48, 0x14, 0x207, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}, [@nested={0x0, 0x0, [@typed={0x300, 0x0, @fd}]}]}, 0x24c}}, 0x0) 03:37:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndmidi(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000040)={0x10, 0xf0ffffff00000f00}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x48, 0x14, 0x207, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}, [@nested={0x0, 0x0, [@typed={0x300, 0x0, @fd}]}]}, 0x24c}}, 0x0) 03:37:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndmidi(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000040)={0x10, 0xf0ffffff00000f00}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x48, 0x14, 0x207, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}, [@nested={0x0, 0x0, [@typed={0x300, 0x0, @fd}]}]}, 0x24c}}, 0x0) 03:37:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndmidi(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000040)={0x10, 0xf0ffffff00000f00}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x48, 0x14, 0x207, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}, [@nested={0x0, 0x0, [@typed={0x300, 0x0, @fd}]}]}, 0x24c}}, 0x0) 03:37:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndmidi(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000040)={0x10, 0xf0ffffff00000f00}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x48, 0x14, 0x207, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}, [@nested={0x0, 0x0, [@typed={0x300, 0x0, @fd}]}]}, 0x24c}}, 0x0) 03:37:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") personality(0x5000008) uname(&(0x7f0000000080)=""/6) 03:37:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndmidi(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000040)={0x10, 0xf0ffffff00000f00}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x48, 0x14, 0x207, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}, [@nested={0x0, 0x0, [@typed={0x300, 0x0, @fd}]}]}, 0x24c}}, 0x0) 03:37:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") personality(0x5000008) uname(&(0x7f0000000080)=""/6) 03:37:15 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008032, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000447000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000997000/0x3000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x2, 0x10000000002) 03:37:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndmidi(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000040)={0x10, 0xf0ffffff00000f00}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x48, 0x14, 0x207, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}, [@nested={0x0, 0x0, [@typed={0x300, 0x0, @fd}]}]}, 0x24c}}, 0x0) 03:37:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") personality(0x5000008) uname(&(0x7f0000000080)=""/6) 03:37:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") socket$nl_xfrm(0xa, 0x3, 0x87) syz_emit_ethernet(0x4a, &(0x7f0000000040)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0xffffff87, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:37:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") personality(0x5000008) uname(&(0x7f0000000080)=""/6) 03:37:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000540)={'lo\x00', &(0x7f0000000000)=@ethtool_cmd={0x15}}) 03:37:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") personality(0x5000008) uname(&(0x7f0000000080)=""/6) [ 360.620250] sched: DL replenish lagged too much 03:37:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000540)={'lo\x00', &(0x7f0000000000)=@ethtool_cmd={0x15}}) 03:37:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") socket$nl_xfrm(0xa, 0x3, 0x87) syz_emit_ethernet(0x4a, &(0x7f0000000040)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0xffffff87, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:37:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndmidi(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000040)={0x10, 0xf0ffffff00000f00}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x48, 0x14, 0x207, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}, [@nested={0x0, 0x0, [@typed={0x300, 0x0, @fd}]}]}, 0x24c}}, 0x0) 03:37:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000540)={'lo\x00', &(0x7f0000000000)=@ethtool_cmd={0x15}}) 03:37:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") personality(0x5000008) uname(&(0x7f0000000080)=""/6) 03:37:16 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008032, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000447000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000997000/0x3000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x2, 0x10000000002) 03:37:16 executing program 4: setrlimit(0x7, &(0x7f0000000080)) signalfd4(0xffffffffffffffff, &(0x7f0000000100), 0x8, 0x0) 03:37:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") socket$nl_xfrm(0xa, 0x3, 0x87) syz_emit_ethernet(0x4a, &(0x7f0000000040)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0xffffff87, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:37:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000540)={'lo\x00', &(0x7f0000000000)=@ethtool_cmd={0x15}}) 03:37:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") personality(0x5000008) uname(&(0x7f0000000080)=""/6) 03:37:16 executing program 3: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:16 executing program 4: setrlimit(0x7, &(0x7f0000000080)) signalfd4(0xffffffffffffffff, &(0x7f0000000100), 0x8, 0x0) 03:37:16 executing program 2: setrlimit(0x7, &(0x7f0000000080)) signalfd4(0xffffffffffffffff, &(0x7f0000000100), 0x8, 0x0) 03:37:16 executing program 4: setrlimit(0x7, &(0x7f0000000080)) signalfd4(0xffffffffffffffff, &(0x7f0000000100), 0x8, 0x0) 03:37:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") socket$nl_xfrm(0xa, 0x3, 0x87) syz_emit_ethernet(0x4a, &(0x7f0000000040)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0xffffff87, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:37:16 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008032, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000447000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000997000/0x3000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x2, 0x10000000002) 03:37:16 executing program 2: setrlimit(0x7, &(0x7f0000000080)) signalfd4(0xffffffffffffffff, &(0x7f0000000100), 0x8, 0x0) 03:37:16 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008032, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000447000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000997000/0x3000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x2, 0x10000000002) 03:37:16 executing program 2: setrlimit(0x7, &(0x7f0000000080)) signalfd4(0xffffffffffffffff, &(0x7f0000000100), 0x8, 0x0) 03:37:16 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008032, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000447000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000997000/0x3000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x2, 0x10000000002) 03:37:16 executing program 4: setrlimit(0x7, &(0x7f0000000080)) signalfd4(0xffffffffffffffff, &(0x7f0000000100), 0x8, 0x0) 03:37:16 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008032, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000447000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000997000/0x3000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x2, 0x10000000002) 03:37:17 executing program 3: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:17 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008032, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000447000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000997000/0x3000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x2, 0x10000000002) 03:37:17 executing program 4: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:17 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008032, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000447000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000997000/0x3000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x2, 0x10000000002) 03:37:17 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008032, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000447000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000997000/0x3000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x2, 0x10000000002) 03:37:17 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008032, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000447000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000997000/0x3000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x2, 0x10000000002) 03:37:17 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008032, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000447000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000997000/0x3000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x2, 0x10000000002) 03:37:18 executing program 0: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:18 executing program 5: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:18 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:18 executing program 4: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:18 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008032, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000447000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000997000/0x3000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x2, 0x10000000002) 03:37:18 executing program 3: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:18 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:18 executing program 5: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:18 executing program 0: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:18 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008032, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000447000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000997000/0x3000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x2, 0x10000000002) 03:37:18 executing program 2: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:18 executing program 3: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:18 executing program 4: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:19 executing program 0: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:19 executing program 5: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:19 executing program 2: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:19 executing program 4: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:19 executing program 5: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:19 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:19 executing program 2: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:19 executing program 5: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:19 executing program 3: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:19 executing program 0: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:19 executing program 4: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:20 executing program 5: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:20 executing program 3: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:20 executing program 0: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:20 executing program 4: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:20 executing program 2: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:20 executing program 3: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:20 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:20 executing program 0: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:20 executing program 2: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:20 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008032, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000447000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000997000/0x3000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x2, 0x10000000002) 03:37:20 executing program 4: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000000) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f0000003d40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x16d, &(0x7f0000003740), 0x1f4, &(0x7f0000000140), 0xcf}}], 0x40000000000027f, 0x0) 03:37:20 executing program 4: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000000) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f0000003d40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x16d, &(0x7f0000003740), 0x1f4, &(0x7f0000000140), 0xcf}}], 0x40000000000027f, 0x0) 03:37:20 executing program 4: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000000) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f0000003d40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x16d, &(0x7f0000003740), 0x1f4, &(0x7f0000000140), 0xcf}}], 0x40000000000027f, 0x0) 03:37:20 executing program 4: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000000) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f0000003d40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x16d, &(0x7f0000003740), 0x1f4, &(0x7f0000000140), 0xcf}}], 0x40000000000027f, 0x0) 03:37:20 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008032, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000447000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000997000/0x3000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x2, 0x10000000002) 03:37:21 executing program 4: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000000) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f0000003d40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x16d, &(0x7f0000003740), 0x1f4, &(0x7f0000000140), 0xcf}}], 0x40000000000027f, 0x0) 03:37:21 executing program 2: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:21 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:21 executing program 0: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000000) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f0000003d40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x16d, &(0x7f0000003740), 0x1f4, &(0x7f0000000140), 0xcf}}], 0x40000000000027f, 0x0) 03:37:21 executing program 4: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000000) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f0000003d40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x16d, &(0x7f0000003740), 0x1f4, &(0x7f0000000140), 0xcf}}], 0x40000000000027f, 0x0) 03:37:21 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008032, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000447000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000997000/0x3000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x2, 0x10000000002) 03:37:21 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000000) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f0000003d40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x16d, &(0x7f0000003740), 0x1f4, &(0x7f0000000140), 0xcf}}], 0x40000000000027f, 0x0) 03:37:21 executing program 0: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000000) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f0000003d40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x16d, &(0x7f0000003740), 0x1f4, &(0x7f0000000140), 0xcf}}], 0x40000000000027f, 0x0) 03:37:21 executing program 4: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000000) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f0000003d40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x16d, &(0x7f0000003740), 0x1f4, &(0x7f0000000140), 0xcf}}], 0x40000000000027f, 0x0) 03:37:21 executing program 0: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000000) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f0000003d40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x16d, &(0x7f0000003740), 0x1f4, &(0x7f0000000140), 0xcf}}], 0x40000000000027f, 0x0) 03:37:21 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 03:37:21 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000000) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f0000003d40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x16d, &(0x7f0000003740), 0x1f4, &(0x7f0000000140), 0xcf}}], 0x40000000000027f, 0x0) 03:37:21 executing program 4: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) exit(0x0) sendfile(r0, r0, 0x0, 0x633e) 03:37:21 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000000) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f0000003d40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x16d, &(0x7f0000003740), 0x1f4, &(0x7f0000000140), 0xcf}}], 0x40000000000027f, 0x0) 03:37:21 executing program 0: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0xc51d}], 0x1}, 0x0) shutdown(r0, 0x1) shutdown(r0, 0x1) 03:37:21 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000300)=ANY=[@ANYBLOB="0f2b9b"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000039000/0x18000)=nil, 0x0, 0x2cb, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:37:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 03:37:22 executing program 3: socket$packet(0x11, 0x0, 0x300) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="a84a2ae92c431c420f05bf07000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80d1e3e30b110fb8c4014e4e0b5b5b016d7d14dee509c421045f4607c422adaf50e3c42a0b9ec45b70c4c4420f0fcca4c483397fd300f7dcdc470bbcafaf10f138f653afaf6766f2ab440fec3facacc4c3214cb9a5604b19c201b00b000000f08171a30b8a826e670f542c3d271c0000a80dd4d48f6978d25debe8628f68088f89e092ca218de3c0f52641802d08000000fa49c4f6a1dd7dbbbfdd5c6666430f3a15150e00000024bedcdca1c9fb110f66474f383ae34ba29fb7e2") recvmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 03:37:22 executing program 0: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0xc51d}], 0x1}, 0x0) shutdown(r0, 0x1) shutdown(r0, 0x1) 03:37:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 03:37:22 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000300)=ANY=[@ANYBLOB="0f2b9b"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000039000/0x18000)=nil, 0x0, 0x2cb, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:37:22 executing program 0: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0xc51d}], 0x1}, 0x0) shutdown(r0, 0x1) shutdown(r0, 0x1) 03:37:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 03:37:22 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000300)=ANY=[@ANYBLOB="0f2b9b"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000039000/0x18000)=nil, 0x0, 0x2cb, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:37:22 executing program 4: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) exit(0x0) sendfile(r0, r0, 0x0, 0x633e) 03:37:22 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000300)=ANY=[@ANYBLOB="0f2b9b"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000039000/0x18000)=nil, 0x0, 0x2cb, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:37:22 executing program 0: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0xc51d}], 0x1}, 0x0) shutdown(r0, 0x1) shutdown(r0, 0x1) 03:37:22 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000300)=ANY=[@ANYBLOB="0f2b9b"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000039000/0x18000)=nil, 0x0, 0x2cb, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:37:22 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000300)=ANY=[@ANYBLOB="0f2b9b"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000039000/0x18000)=nil, 0x0, 0x2cb, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:37:22 executing program 3: socket$packet(0x11, 0x0, 0x300) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="a84a2ae92c431c420f05bf07000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80d1e3e30b110fb8c4014e4e0b5b5b016d7d14dee509c421045f4607c422adaf50e3c42a0b9ec45b70c4c4420f0fcca4c483397fd300f7dcdc470bbcafaf10f138f653afaf6766f2ab440fec3facacc4c3214cb9a5604b19c201b00b000000f08171a30b8a826e670f542c3d271c0000a80dd4d48f6978d25debe8628f68088f89e092ca218de3c0f52641802d08000000fa49c4f6a1dd7dbbbfdd5c6666430f3a15150e00000024bedcdca1c9fb110f66474f383ae34ba29fb7e2") recvmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 03:37:22 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) exit(0x0) sendfile(r0, r0, 0x0, 0x633e) 03:37:22 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000300)=ANY=[@ANYBLOB="0f2b9b"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000039000/0x18000)=nil, 0x0, 0x2cb, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:37:22 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000300)=ANY=[@ANYBLOB="0f2b9b"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000039000/0x18000)=nil, 0x0, 0x2cb, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:37:22 executing program 5: socket$packet(0x11, 0x0, 0x300) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="a84a2ae92c431c420f05bf07000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80d1e3e30b110fb8c4014e4e0b5b5b016d7d14dee509c421045f4607c422adaf50e3c42a0b9ec45b70c4c4420f0fcca4c483397fd300f7dcdc470bbcafaf10f138f653afaf6766f2ab440fec3facacc4c3214cb9a5604b19c201b00b000000f08171a30b8a826e670f542c3d271c0000a80dd4d48f6978d25debe8628f68088f89e092ca218de3c0f52641802d08000000fa49c4f6a1dd7dbbbfdd5c6666430f3a15150e00000024bedcdca1c9fb110f66474f383ae34ba29fb7e2") recvmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 03:37:23 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000300)=ANY=[@ANYBLOB="0f2b9b"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000039000/0x18000)=nil, 0x0, 0x2cb, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:37:23 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000300)=ANY=[@ANYBLOB="0f2b9b"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000039000/0x18000)=nil, 0x0, 0x2cb, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:37:23 executing program 4: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) exit(0x0) sendfile(r0, r0, 0x0, 0x633e) 03:37:23 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000300)=ANY=[@ANYBLOB="0f2b9b"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000039000/0x18000)=nil, 0x0, 0x2cb, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:37:23 executing program 1: socket$packet(0x11, 0x0, 0x300) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="a84a2ae92c431c420f05bf07000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80d1e3e30b110fb8c4014e4e0b5b5b016d7d14dee509c421045f4607c422adaf50e3c42a0b9ec45b70c4c4420f0fcca4c483397fd300f7dcdc470bbcafaf10f138f653afaf6766f2ab440fec3facacc4c3214cb9a5604b19c201b00b000000f08171a30b8a826e670f542c3d271c0000a80dd4d48f6978d25debe8628f68088f89e092ca218de3c0f52641802d08000000fa49c4f6a1dd7dbbbfdd5c6666430f3a15150e00000024bedcdca1c9fb110f66474f383ae34ba29fb7e2") recvmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 03:37:23 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) exit(0x0) sendfile(r0, r0, 0x0, 0x633e) 03:37:23 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000300)=ANY=[@ANYBLOB="0f2b9b"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000039000/0x18000)=nil, 0x0, 0x2cb, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:37:24 executing program 3: socket$packet(0x11, 0x0, 0x300) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="a84a2ae92c431c420f05bf07000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80d1e3e30b110fb8c4014e4e0b5b5b016d7d14dee509c421045f4607c422adaf50e3c42a0b9ec45b70c4c4420f0fcca4c483397fd300f7dcdc470bbcafaf10f138f653afaf6766f2ab440fec3facacc4c3214cb9a5604b19c201b00b000000f08171a30b8a826e670f542c3d271c0000a80dd4d48f6978d25debe8628f68088f89e092ca218de3c0f52641802d08000000fa49c4f6a1dd7dbbbfdd5c6666430f3a15150e00000024bedcdca1c9fb110f66474f383ae34ba29fb7e2") recvmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 03:37:24 executing program 5: socket$packet(0x11, 0x0, 0x300) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="a84a2ae92c431c420f05bf07000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80d1e3e30b110fb8c4014e4e0b5b5b016d7d14dee509c421045f4607c422adaf50e3c42a0b9ec45b70c4c4420f0fcca4c483397fd300f7dcdc470bbcafaf10f138f653afaf6766f2ab440fec3facacc4c3214cb9a5604b19c201b00b000000f08171a30b8a826e670f542c3d271c0000a80dd4d48f6978d25debe8628f68088f89e092ca218de3c0f52641802d08000000fa49c4f6a1dd7dbbbfdd5c6666430f3a15150e00000024bedcdca1c9fb110f66474f383ae34ba29fb7e2") recvmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 03:37:24 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000300)=ANY=[@ANYBLOB="0f2b9b"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000039000/0x18000)=nil, 0x0, 0x2cb, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:37:24 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0xc51d}], 0x1}, 0x0) shutdown(r0, 0x1) shutdown(r0, 0x1) 03:37:24 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0xc51d}], 0x1}, 0x0) shutdown(r0, 0x1) shutdown(r0, 0x1) 03:37:24 executing program 4: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) exit(0x0) sendfile(r0, r0, 0x0, 0x633e) 03:37:24 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0xc51d}], 0x1}, 0x0) shutdown(r0, 0x1) shutdown(r0, 0x1) 03:37:24 executing program 1: socket$packet(0x11, 0x0, 0x300) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="a84a2ae92c431c420f05bf07000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80d1e3e30b110fb8c4014e4e0b5b5b016d7d14dee509c421045f4607c422adaf50e3c42a0b9ec45b70c4c4420f0fcca4c483397fd300f7dcdc470bbcafaf10f138f653afaf6766f2ab440fec3facacc4c3214cb9a5604b19c201b00b000000f08171a30b8a826e670f542c3d271c0000a80dd4d48f6978d25debe8628f68088f89e092ca218de3c0f52641802d08000000fa49c4f6a1dd7dbbbfdd5c6666430f3a15150e00000024bedcdca1c9fb110f66474f383ae34ba29fb7e2") recvmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 03:37:24 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) exit(0x0) sendfile(r0, r0, 0x0, 0x633e) 03:37:24 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0xc51d}], 0x1}, 0x0) shutdown(r0, 0x1) shutdown(r0, 0x1) 03:37:24 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0xc51d}], 0x1}, 0x0) shutdown(r0, 0x1) shutdown(r0, 0x1) 03:37:25 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0xc51d}], 0x1}, 0x0) shutdown(r0, 0x1) shutdown(r0, 0x1) 03:37:25 executing program 3: socket$packet(0x11, 0x0, 0x300) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="a84a2ae92c431c420f05bf07000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80d1e3e30b110fb8c4014e4e0b5b5b016d7d14dee509c421045f4607c422adaf50e3c42a0b9ec45b70c4c4420f0fcca4c483397fd300f7dcdc470bbcafaf10f138f653afaf6766f2ab440fec3facacc4c3214cb9a5604b19c201b00b000000f08171a30b8a826e670f542c3d271c0000a80dd4d48f6978d25debe8628f68088f89e092ca218de3c0f52641802d08000000fa49c4f6a1dd7dbbbfdd5c6666430f3a15150e00000024bedcdca1c9fb110f66474f383ae34ba29fb7e2") recvmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 03:37:25 executing program 5: socket$packet(0x11, 0x0, 0x300) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="a84a2ae92c431c420f05bf07000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80d1e3e30b110fb8c4014e4e0b5b5b016d7d14dee509c421045f4607c422adaf50e3c42a0b9ec45b70c4c4420f0fcca4c483397fd300f7dcdc470bbcafaf10f138f653afaf6766f2ab440fec3facacc4c3214cb9a5604b19c201b00b000000f08171a30b8a826e670f542c3d271c0000a80dd4d48f6978d25debe8628f68088f89e092ca218de3c0f52641802d08000000fa49c4f6a1dd7dbbbfdd5c6666430f3a15150e00000024bedcdca1c9fb110f66474f383ae34ba29fb7e2") recvmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 03:37:25 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0xc51d}], 0x1}, 0x0) shutdown(r0, 0x1) shutdown(r0, 0x1) 03:37:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB=',fscontext=']) clone(0x21a2101ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) [ 370.220815] SELinux: unknown mount option 03:37:25 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0xc51d}], 0x1}, 0x0) shutdown(r0, 0x1) shutdown(r0, 0x1) 03:37:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB=',fscontext=']) clone(0x21a2101ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) 03:37:25 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB=',fscontext=']) clone(0x21a2101ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) [ 370.415381] SELinux: unknown mount option [ 370.517135] SELinux: unknown mount option 03:37:26 executing program 1: socket$packet(0x11, 0x0, 0x300) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="a84a2ae92c431c420f05bf07000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80d1e3e30b110fb8c4014e4e0b5b5b016d7d14dee509c421045f4607c422adaf50e3c42a0b9ec45b70c4c4420f0fcca4c483397fd300f7dcdc470bbcafaf10f138f653afaf6766f2ab440fec3facacc4c3214cb9a5604b19c201b00b000000f08171a30b8a826e670f542c3d271c0000a80dd4d48f6978d25debe8628f68088f89e092ca218de3c0f52641802d08000000fa49c4f6a1dd7dbbbfdd5c6666430f3a15150e00000024bedcdca1c9fb110f66474f383ae34ba29fb7e2") recvmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 03:37:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB=',fscontext=']) clone(0x21a2101ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) 03:37:26 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0xc51d}], 0x1}, 0x0) shutdown(r0, 0x1) shutdown(r0, 0x1) 03:37:26 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB=',fscontext=']) clone(0x21a2101ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) 03:37:26 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="b77aa0c6be9f2a06fcd1ddbce5cfbb07a954d6096b54bc90706d0121942014015779d24f2fd71085cafcc5a8fdde88e7fb4db063fabc53d78918aaaf20dfe42eef1e48634baca69dd56fea98351c4feb400e33a62de8328a90e332083a63a6e3e2e8650d455f274ff78f697e62b05c5bf63d4ac8d35e53e5c1a2dfc110804620c802a85a525dc47afbe7ad06d4a0f8d273f5a6f267150c191fd96fe9ace8fb56f41cfb7bcabe27f4bcd758163c3d08e69bfffc14865881ca151cd7c0925e54ef99b4d7cc1b3e4326ca81d40800000000000000ba58100e442a10fd3c02f074c0297bb1f86bf0491a2b89dc541e034d39efc5fa85c59668303d86589634ce834ec849be1a1fe549c19f740d6cf1dd36782fa2f3a43ccdd12c3c566c3523ca8d7cc0f27a0b0a223fb9c360a7a186cc8be1e16b0657ee6a2d9dffe5745533", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) 03:37:26 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB=',fscontext=']) clone(0x21a2101ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) [ 370.853909] SELinux: unknown mount option [ 370.865984] SELinux: unknown mount option [ 370.948036] SELinux: unknown mount option [ 370.963407] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 03:37:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r1, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x5}, 0x10) connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 03:37:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB=',fscontext=']) clone(0x21a2101ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) 03:37:26 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x14, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000000)=[@register_looper], 0x1, 0x0, &(0x7f0000000040)="f0"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000540)={0x4c, 0x0, &(0x7f0000000300)=[@reply_sg={0x40486312, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}], 0x0, 0x0, 0x0}) 03:37:26 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="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", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) 03:37:26 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="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", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) [ 371.395681] audit: type=1400 audit(2000000246.716:134): avc: denied { call } for pid=20307 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 [ 371.423076] binder: 20307:20309 ERROR: BC_REGISTER_LOOPER called without request [ 371.427046] SELinux: unknown mount option 03:37:26 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="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", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) [ 371.454367] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. [ 371.464469] binder_alloc: 20307: binder_alloc_buf, no vma [ 371.518016] binder: 20307:20309 transaction failed 29189/-3, size 0-0 line 2917 [ 371.594353] binder: send failed reply for transaction 7 to 20307:20309 [ 371.657763] binder: undelivered TRANSACTION_COMPLETE [ 371.663916] binder: undelivered TRANSACTION_ERROR: 29189 [ 371.679777] binder: undelivered TRANSACTION_ERROR: 29190 [ 371.689989] binder: 20307:20309 ERROR: BC_REGISTER_LOOPER called without request 03:37:27 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="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", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) [ 371.703423] binder: 20307:20326 got reply transaction with no transaction stack 03:37:27 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="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", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) 03:37:27 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="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", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) 03:37:27 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="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", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) [ 371.741140] binder: release 20307:20326 transaction 10 out, still active [ 371.748296] binder: 20307:20326 transaction failed 29201/-71, size 0-0 line 2709 [ 371.775355] binder: undelivered TRANSACTION_COMPLETE 03:37:27 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x14, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000000)=[@register_looper], 0x1, 0x0, &(0x7f0000000040)="f0"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000540)={0x4c, 0x0, &(0x7f0000000300)=[@reply_sg={0x40486312, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}], 0x0, 0x0, 0x0}) [ 371.847745] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 371.856881] binder: release 20307:20309 transaction 10 in, still active [ 371.856910] binder: send failed reply for transaction 10, target dead [ 371.856931] binder: undelivered TRANSACTION_ERROR: 29201 [ 371.885518] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 03:37:27 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x14, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000000)=[@register_looper], 0x1, 0x0, &(0x7f0000000040)="f0"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000540)={0x4c, 0x0, &(0x7f0000000300)=[@reply_sg={0x40486312, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}], 0x0, 0x0, 0x0}) [ 371.911885] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 371.944764] binder: 20341:20344 ERROR: BC_REGISTER_LOOPER called without request [ 371.974609] binder_alloc: 20341: binder_alloc_buf, no vma [ 371.985232] binder: 20341:20344 transaction failed 29189/-3, size 0-0 line 2917 [ 372.010552] binder: send failed reply for transaction 13 to 20341:20344 [ 372.024965] binder: undelivered TRANSACTION_COMPLETE [ 372.030294] binder: undelivered TRANSACTION_ERROR: 29189 [ 372.045906] binder: BINDER_SET_CONTEXT_MGR already set [ 372.051872] binder: 20345:20347 ioctl 40046207 0 returned -16 [ 372.051880] binder: undelivered TRANSACTION_ERROR: 29190 [ 372.065063] binder: 20345:20347 transaction failed 29189/-22, size 0-0 line 2802 [ 372.080931] binder: 20345:20347 ERROR: BC_REGISTER_LOOPER called without request [ 372.126416] binder: 20345:20350 got reply transaction with no transaction stack [ 372.134193] binder: 20345:20350 transaction failed 29201/-71, size 0-0 line 2709 03:37:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r1, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x5}, 0x10) connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 03:37:27 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="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", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) 03:37:27 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="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", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) 03:37:27 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x14, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000000)=[@register_looper], 0x1, 0x0, &(0x7f0000000040)="f0"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000540)={0x4c, 0x0, &(0x7f0000000300)=[@reply_sg={0x40486312, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}], 0x0, 0x0, 0x0}) 03:37:27 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="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", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) 03:37:27 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="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", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) [ 372.452141] binder: 20355:20363 ERROR: BC_REGISTER_LOOPER called without request [ 372.462778] binder_alloc: 20355: binder_alloc_buf, no vma [ 372.468714] binder: 20355:20363 transaction failed 29189/-3, size 0-0 line 2917 [ 372.478386] binder: send failed reply for transaction 18 to 20355:20363 [ 372.497415] binder: undelivered TRANSACTION_COMPLETE [ 372.506692] binder: undelivered TRANSACTION_ERROR: 29189 03:37:27 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x14, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000000)=[@register_looper], 0x1, 0x0, &(0x7f0000000040)="f0"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000540)={0x4c, 0x0, &(0x7f0000000300)=[@reply_sg={0x40486312, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}], 0x0, 0x0, 0x0}) [ 372.548459] binder: undelivered TRANSACTION_ERROR: 29190 03:37:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r1, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x5}, 0x10) connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 03:37:27 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="b77aa0c6be9f2a06fcd1ddbce5cfbb07a954d6096b54bc90706d0121942014015779d24f2fd71085cafcc5a8fdde88e7fb4db063fabc53d78918aaaf20dfe42eef1e48634baca69dd56fea98351c4feb400e33a62de8328a90e332083a63a6e3e2e8650d455f274ff78f697e62b05c5bf63d4ac8d35e53e5c1a2dfc110804620c802a85a525dc47afbe7ad06d4a0f8d273f5a6f267150c191fd96fe9ace8fb56f41cfb7bcabe27f4bcd758163c3d08e69bfffc14865881ca151cd7c0925e54ef99b4d7cc1b3e4326ca81d40800000000000000ba58100e442a10fd3c02f074c0297bb1f86bf0491a2b89dc541e034d39efc5fa85c59668303d86589634ce834ec849be1a1fe549c19f740d6cf1dd36782fa2f3a43ccdd12c3c566c3523ca8d7cc0f27a0b0a223fb9c360a7a186cc8be1e16b0657ee6a2d9dffe5745533", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) 03:37:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r1, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x5}, 0x10) connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 372.649097] binder: 20371:20374 ERROR: BC_REGISTER_LOOPER called without request [ 372.701727] binder: 20371:20381 got reply transaction with no transaction stack [ 372.736426] binder: 20371:20381 transaction failed 29201/-71, size 0-0 line 2709 [ 372.738914] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 372.771448] binder: release 20371:20374 transaction 21 out, still active [ 372.787113] binder: undelivered TRANSACTION_COMPLETE 03:37:28 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x14, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000000)=[@register_looper], 0x1, 0x0, &(0x7f0000000040)="f0"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000540)={0x4c, 0x0, &(0x7f0000000300)=[@reply_sg={0x40486312, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}], 0x0, 0x0, 0x0}) [ 372.808849] binder: release 20371:20374 transaction 21 in, still active [ 372.847363] binder: send failed reply for transaction 21, target dead 03:37:28 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x14, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000000)=[@register_looper], 0x1, 0x0, &(0x7f0000000040)="f0"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000540)={0x4c, 0x0, &(0x7f0000000300)=[@reply_sg={0x40486312, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}], 0x0, 0x0, 0x0}) [ 372.897068] binder: undelivered TRANSACTION_ERROR: 29201 [ 372.908349] binder: 20388:20390 ERROR: BC_REGISTER_LOOPER called without request [ 372.926178] binder: undelivered TRANSACTION_ERROR: 29189 [ 372.960605] binder: 20388:20391 got reply transaction with no transaction stack [ 372.981031] binder: undelivered TRANSACTION_ERROR: 29201 [ 373.005230] binder: 20388:20391 transaction failed 29201/-71, size 0-0 line 2709 [ 373.014671] binder: BINDER_SET_CONTEXT_MGR already set [ 373.034825] binder: 20393:20394 ioctl 40046207 0 returned -16 [ 373.034830] binder: release 20388:20390 transaction 24 out, still active [ 373.034840] binder: undelivered TRANSACTION_COMPLETE [ 373.059153] binder: 20393:20394 ERROR: BC_REGISTER_LOOPER called without request [ 373.081641] binder: release 20388:20390 transaction 24 in, still active [ 373.100576] binder: send failed reply for transaction 24, target dead [ 373.107436] binder: 20393:20396 got reply transaction with no transaction stack [ 373.125490] binder: undelivered TRANSACTION_ERROR: 29201 [ 373.135165] binder: 20393:20396 transaction failed 29201/-71, size 0-0 line 2709 [ 373.143071] binder: send failed reply for transaction 26 to 20393:20394 03:37:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r1, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x5}, 0x10) connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 03:37:28 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x14, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000000)=[@register_looper], 0x1, 0x0, &(0x7f0000000040)="f0"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000540)={0x4c, 0x0, &(0x7f0000000300)=[@reply_sg={0x40486312, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}], 0x0, 0x0, 0x0}) 03:37:28 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x14, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000000)=[@register_looper], 0x1, 0x0, &(0x7f0000000040)="f0"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000540)={0x4c, 0x0, &(0x7f0000000300)=[@reply_sg={0x40486312, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}], 0x0, 0x0, 0x0}) [ 373.228150] binder: 20397:20400 ERROR: BC_REGISTER_LOOPER called without request [ 373.241277] binder_alloc: 20397: binder_alloc_buf, no vma [ 373.249198] binder: BINDER_SET_CONTEXT_MGR already set [ 373.255227] binder: 20398:20402 ioctl 40046207 0 returned -16 [ 373.257604] binder: 20397:20400 transaction failed 29189/-3, size 0-0 line 2917 [ 373.266341] binder: 20398:20402 ERROR: BC_REGISTER_LOOPER called without request [ 373.274722] binder: send failed reply for transaction 29 to 20397:20400 [ 373.290888] binder: undelivered TRANSACTION_COMPLETE [ 373.296020] binder: undelivered TRANSACTION_ERROR: 29189 [ 373.311681] binder: undelivered TRANSACTION_ERROR: 29190 [ 373.317206] binder: send failed reply for transaction 31 to 20398:20402 03:37:28 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x14, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000000)=[@register_looper], 0x1, 0x0, &(0x7f0000000040)="f0"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000540)={0x4c, 0x0, &(0x7f0000000300)=[@reply_sg={0x40486312, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}], 0x0, 0x0, 0x0}) [ 373.324297] binder: 20398:20405 got reply transaction with no transaction stack [ 373.337808] binder: 20398:20405 transaction failed 29201/-71, size 0-0 line 2709 [ 373.354006] binder: 20407:20408 ERROR: BC_REGISTER_LOOPER called without request [ 373.367399] binder_alloc: 20407: binder_alloc_buf, no vma [ 373.373851] binder: 20407:20408 transaction failed 29189/-3, size 0-0 line 2917 [ 373.390978] binder: send failed reply for transaction 34 to 20407:20408 [ 373.403446] binder: undelivered TRANSACTION_COMPLETE [ 373.409009] binder: undelivered TRANSACTION_ERROR: 29189 03:37:28 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x14, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000000)=[@register_looper], 0x1, 0x0, &(0x7f0000000040)="f0"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000540)={0x4c, 0x0, &(0x7f0000000300)=[@reply_sg={0x40486312, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}], 0x0, 0x0, 0x0}) [ 373.428576] binder: undelivered TRANSACTION_ERROR: 29190 03:37:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r1, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x5}, 0x10) connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 373.491219] binder: 20409:20411 ERROR: BC_REGISTER_LOOPER called without request [ 373.502735] binder_alloc: 20409: binder_alloc_buf, no vma [ 373.523291] binder: 20409:20411 transaction failed 29189/-3, size 0-0 line 2917 03:37:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r1, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x5}, 0x10) connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 03:37:28 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x14, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000000)=[@register_looper], 0x1, 0x0, &(0x7f0000000040)="f0"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000540)={0x4c, 0x0, &(0x7f0000000300)=[@reply_sg={0x40486312, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}], 0x0, 0x0, 0x0}) [ 373.545518] binder: send failed reply for transaction 37 to 20409:20411 [ 373.563785] binder: undelivered TRANSACTION_COMPLETE [ 373.569457] binder: undelivered TRANSACTION_ERROR: 29189 [ 373.586582] binder: undelivered TRANSACTION_ERROR: 29190 [ 373.653449] binder: 20419:20421 ERROR: BC_REGISTER_LOOPER called without request [ 373.675758] binder_alloc: 20419: binder_alloc_buf, no vma [ 373.682233] binder: 20419:20421 transaction failed 29189/-3, size 0-0 line 2917 [ 373.690210] binder: send failed reply for transaction 40 to 20419:20421 03:37:29 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x14, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000000)=[@register_looper], 0x1, 0x0, &(0x7f0000000040)="f0"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000540)={0x4c, 0x0, &(0x7f0000000300)=[@reply_sg={0x40486312, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}], 0x0, 0x0, 0x0}) [ 373.708946] binder: undelivered TRANSACTION_COMPLETE [ 373.714478] binder: undelivered TRANSACTION_ERROR: 29189 [ 373.746765] binder: undelivered TRANSACTION_ERROR: 29190 [ 373.799983] binder: undelivered TRANSACTION_COMPLETE [ 373.813032] binder: undelivered TRANSACTION_ERROR: 29189 [ 373.836237] binder: 20424:20425 ERROR: BC_REGISTER_LOOPER called without request [ 373.837344] binder: undelivered TRANSACTION_ERROR: 29201 03:37:29 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x14, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000000)=[@register_looper], 0x1, 0x0, &(0x7f0000000040)="f0"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000540)={0x4c, 0x0, &(0x7f0000000300)=[@reply_sg={0x40486312, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}], 0x0, 0x0, 0x0}) [ 373.859085] binder_alloc: 20424: binder_alloc_buf, no vma [ 373.873099] binder: 20424:20425 transaction failed 29189/-3, size 0-0 line 2917 [ 373.884612] binder: send failed reply for transaction 43 to 20424:20425 [ 373.895663] binder: BINDER_SET_CONTEXT_MGR already set 03:37:29 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x14, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000000)=[@register_looper], 0x1, 0x0, &(0x7f0000000040)="f0"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000540)={0x4c, 0x0, &(0x7f0000000300)=[@reply_sg={0x40486312, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}], 0x0, 0x0, 0x0}) [ 373.906184] binder: 20427:20428 ioctl 40046207 0 returned -16 [ 373.906198] binder: undelivered TRANSACTION_COMPLETE [ 373.916973] binder: 20427:20428 ERROR: BC_REGISTER_LOOPER called without request [ 373.923128] binder: undelivered TRANSACTION_ERROR: 29189 [ 373.943823] binder: undelivered TRANSACTION_ERROR: 29190 [ 373.949368] binder: send failed reply for transaction 45 to 20427:20428 [ 373.963412] binder: 20430:20431 ERROR: BC_REGISTER_LOOPER called without request [ 373.970135] binder: 20427:20432 got reply transaction with no transaction stack [ 373.978917] binder: 20427:20432 transaction failed 29201/-71, size 0-0 line 2709 [ 373.982837] binder_alloc: 20430: binder_alloc_buf, no vma [ 373.992573] binder: 20430:20431 transaction failed 29189/-3, size 0-0 line 2917 [ 374.000233] binder: send failed reply for transaction 47 to 20430:20431 03:37:29 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="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", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) [ 374.014392] binder: undelivered TRANSACTION_COMPLETE [ 374.019504] binder: undelivered TRANSACTION_ERROR: 29189 [ 374.032771] binder: undelivered TRANSACTION_ERROR: 29190 03:37:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r1, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x5}, 0x10) connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 03:37:29 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x14, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000000)=[@register_looper], 0x1, 0x0, &(0x7f0000000040)="f0"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000540)={0x4c, 0x0, &(0x7f0000000300)=[@reply_sg={0x40486312, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}], 0x0, 0x0, 0x0}) [ 374.069130] binder: undelivered TRANSACTION_COMPLETE [ 374.074592] binder: undelivered TRANSACTION_ERROR: 29189 [ 374.102504] binder: undelivered TRANSACTION_ERROR: 29201 03:37:29 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="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", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) [ 374.122954] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 374.159299] binder: 20438:20441 ERROR: BC_REGISTER_LOOPER called without request [ 374.170453] binder_alloc: 20438: binder_alloc_buf, no vma [ 374.184303] binder: 20438:20441 transaction failed 29189/-3, size 0-0 line 2917 [ 374.202517] binder: send failed reply for transaction 51 to 20438:20441 03:37:29 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="b77aa0c6be9f2a06fcd1ddbce5cfbb07a954d6096b54bc90706d0121942014015779d24f2fd71085cafcc5a8fdde88e7fb4db063fabc53d78918aaaf20dfe42eef1e48634baca69dd56fea98351c4feb400e33a62de8328a90e332083a63a6e3e2e8650d455f274ff78f697e62b05c5bf63d4ac8d35e53e5c1a2dfc110804620c802a85a525dc47afbe7ad06d4a0f8d273f5a6f267150c191fd96fe9ace8fb56f41cfb7bcabe27f4bcd758163c3d08e69bfffc14865881ca151cd7c0925e54ef99b4d7cc1b3e4326ca81d40800000000000000ba58100e442a10fd3c02f074c0297bb1f86bf0491a2b89dc541e034d39efc5fa85c59668303d86589634ce834ec849be1a1fe549c19f740d6cf1dd36782fa2f3a43ccdd12c3c566c3523ca8d7cc0f27a0b0a223fb9c360a7a186cc8be1e16b0657ee6a2d9dffe5745533", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) 03:37:29 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="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", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) [ 374.219872] binder: undelivered TRANSACTION_COMPLETE [ 374.225375] binder: undelivered TRANSACTION_ERROR: 29189 [ 374.229531] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 374.259483] binder: undelivered TRANSACTION_ERROR: 29190 03:37:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r1, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x5}, 0x10) connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 374.362643] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 03:37:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r1, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x5}, 0x10) connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 03:37:29 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="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", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) 03:37:29 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="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", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) [ 374.563913] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 374.696369] binder: undelivered TRANSACTION_COMPLETE [ 374.702219] binder: undelivered TRANSACTION_ERROR: 29189 03:37:30 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="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", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) 03:37:30 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="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", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) 03:37:30 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="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", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) [ 374.738687] binder: undelivered TRANSACTION_ERROR: 29201 03:37:30 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="b77aa0c6be9f2a06fcd1ddbce5cfbb07a954d6096b54bc90706d0121942014015779d24f2fd71085cafcc5a8fdde88e7fb4db063fabc53d78918aaaf20dfe42eef1e48634baca69dd56fea98351c4feb400e33a62de8328a90e332083a63a6e3e2e8650d455f274ff78f697e62b05c5bf63d4ac8d35e53e5c1a2dfc110804620c802a85a525dc47afbe7ad06d4a0f8d273f5a6f267150c191fd96fe9ace8fb56f41cfb7bcabe27f4bcd758163c3d08e69bfffc14865881ca151cd7c0925e54ef99b4d7cc1b3e4326ca81d40800000000000000ba58100e442a10fd3c02f074c0297bb1f86bf0491a2b89dc541e034d39efc5fa85c59668303d86589634ce834ec849be1a1fe549c19f740d6cf1dd36782fa2f3a43ccdd12c3c566c3523ca8d7cc0f27a0b0a223fb9c360a7a186cc8be1e16b0657ee6a2d9dffe5745533", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) 03:37:30 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="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", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) 03:37:30 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="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", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) 03:37:30 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="b77aa0c6be9f2a06fcd1ddbce5cfbb07a954d6096b54bc90706d0121942014015779d24f2fd71085cafcc5a8fdde88e7fb4db063fabc53d78918aaaf20dfe42eef1e48634baca69dd56fea98351c4feb400e33a62de8328a90e332083a63a6e3e2e8650d455f274ff78f697e62b05c5bf63d4ac8d35e53e5c1a2dfc110804620c802a85a525dc47afbe7ad06d4a0f8d273f5a6f267150c191fd96fe9ace8fb56f41cfb7bcabe27f4bcd758163c3d08e69bfffc14865881ca151cd7c0925e54ef99b4d7cc1b3e4326ca81d40800000000000000ba58100e442a10fd3c02f074c0297bb1f86bf0491a2b89dc541e034d39efc5fa85c59668303d86589634ce834ec849be1a1fe549c19f740d6cf1dd36782fa2f3a43ccdd12c3c566c3523ca8d7cc0f27a0b0a223fb9c360a7a186cc8be1e16b0657ee6a2d9dffe5745533", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) 03:37:30 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="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", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) 03:37:30 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="b77aa0c6be9f2a06fcd1ddbce5cfbb07a954d6096b54bc90706d0121942014015779d24f2fd71085cafcc5a8fdde88e7fb4db063fabc53d78918aaaf20dfe42eef1e48634baca69dd56fea98351c4feb400e33a62de8328a90e332083a63a6e3e2e8650d455f274ff78f697e62b05c5bf63d4ac8d35e53e5c1a2dfc110804620c802a85a525dc47afbe7ad06d4a0f8d273f5a6f267150c191fd96fe9ace8fb56f41cfb7bcabe27f4bcd758163c3d08e69bfffc14865881ca151cd7c0925e54ef99b4d7cc1b3e4326ca81d40800000000000000ba58100e442a10fd3c02f074c0297bb1f86bf0491a2b89dc541e034d39efc5fa85c59668303d86589634ce834ec849be1a1fe549c19f740d6cf1dd36782fa2f3a43ccdd12c3c566c3523ca8d7cc0f27a0b0a223fb9c360a7a186cc8be1e16b0657ee6a2d9dffe5745533", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) 03:37:30 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="b77aa0c6be9f2a06fcd1ddbce5cfbb07a954d6096b54bc90706d0121942014015779d24f2fd71085cafcc5a8fdde88e7fb4db063fabc53d78918aaaf20dfe42eef1e48634baca69dd56fea98351c4feb400e33a62de8328a90e332083a63a6e3e2e8650d455f274ff78f697e62b05c5bf63d4ac8d35e53e5c1a2dfc110804620c802a85a525dc47afbe7ad06d4a0f8d273f5a6f267150c191fd96fe9ace8fb56f41cfb7bcabe27f4bcd758163c3d08e69bfffc14865881ca151cd7c0925e54ef99b4d7cc1b3e4326ca81d40800000000000000ba58100e442a10fd3c02f074c0297bb1f86bf0491a2b89dc541e034d39efc5fa85c59668303d86589634ce834ec849be1a1fe549c19f740d6cf1dd36782fa2f3a43ccdd12c3c566c3523ca8d7cc0f27a0b0a223fb9c360a7a186cc8be1e16b0657ee6a2d9dffe5745533", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) 03:37:30 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000000)={0x0, 0x300, 0x0, [], &(0x7f0000000040)={0x0, 0x0, [], @p_u32=0x0}}) 03:37:30 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="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", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) 03:37:30 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="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", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) 03:37:30 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/net\x00') socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x2) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000100)="b15991cd80696852ef694b00d946f91cc10f788e00800000665b0f3862315868f4a95ff9400f78f68f4808eebce00000802000d4c48192558dc3c36645660ff6e9660d3a128f000000767c7cca4f730747da731f071f075fc4027db8d5646736676666430fefb3000000040804f4f30f1a12548fe97882ec") 03:37:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) lstat(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='lp\x00', 0x2ca) ioctl$int_out(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x500, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/20, 0x14}, {&(0x7f00000018c0)=""/4096, 0x1000}, {&(0x7f0000000080)=""/16, 0x10}, {&(0x7f0000000140)=""/107, 0x6b}], 0x4, &(0x7f00000001c0)=""/65, 0x41}, 0x78}], 0x1, 0x2000, &(0x7f0000000280)={0x0, 0x1c9c380}) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) select(0xfffffffffffffecb, 0x0, 0x0, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0x72516111, 0x100, &(0x7f0000001880), 0xffffff97) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000300)=""/37) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r1, &(0x7f00000008c0)='/', 0x1, 0x0, 0x0, 0x0) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") 03:37:30 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="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", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) [ 375.466861] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:37:30 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="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", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) 03:37:30 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000000)={0x0, 0x300, 0x0, [], &(0x7f0000000040)={0x0, 0x0, [], @p_u32=0x0}}) 03:37:30 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/net\x00') socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x2) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000100)="b15991cd80696852ef694b00d946f91cc10f788e00800000665b0f3862315868f4a95ff9400f78f68f4808eebce00000802000d4c48192558dc3c36645660ff6e9660d3a128f000000767c7cca4f730747da731f071f075fc4027db8d5646736676666430fefb3000000040804f4f30f1a12548fe97882ec") 03:37:31 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="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", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) 03:37:31 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000000)={0x0, 0x300, 0x0, [], &(0x7f0000000040)={0x0, 0x0, [], @p_u32=0x0}}) 03:37:31 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/net\x00') socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x2) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000100)="b15991cd80696852ef694b00d946f91cc10f788e00800000665b0f3862315868f4a95ff9400f78f68f4808eebce00000802000d4c48192558dc3c36645660ff6e9660d3a128f000000767c7cca4f730747da731f071f075fc4027db8d5646736676666430fefb3000000040804f4f30f1a12548fe97882ec") 03:37:31 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/net\x00') socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x2) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000100)="b15991cd80696852ef694b00d946f91cc10f788e00800000665b0f3862315868f4a95ff9400f78f68f4808eebce00000802000d4c48192558dc3c36645660ff6e9660d3a128f000000767c7cca4f730747da731f071f075fc4027db8d5646736676666430fefb3000000040804f4f30f1a12548fe97882ec") 03:37:31 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000000)={0x0, 0x300, 0x0, [], &(0x7f0000000040)={0x0, 0x0, [], @p_u32=0x0}}) 03:37:31 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/net\x00') socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x2) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000100)="b15991cd80696852ef694b00d946f91cc10f788e00800000665b0f3862315868f4a95ff9400f78f68f4808eebce00000802000d4c48192558dc3c36645660ff6e9660d3a128f000000767c7cca4f730747da731f071f075fc4027db8d5646736676666430fefb3000000040804f4f30f1a12548fe97882ec") 03:37:31 executing program 0: clone(0x0, &(0x7f0000000040), 0x0, 0x0, 0x0) waitid(0x0, 0x0, &(0x7f0000002ff0), 0x4100000c, 0x0) 03:37:31 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/net\x00') socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x2) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000100)="b15991cd80696852ef694b00d946f91cc10f788e00800000665b0f3862315868f4a95ff9400f78f68f4808eebce00000802000d4c48192558dc3c36645660ff6e9660d3a128f000000767c7cca4f730747da731f071f075fc4027db8d5646736676666430fefb3000000040804f4f30f1a12548fe97882ec") 03:37:31 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/net\x00') socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x2) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000100)="b15991cd80696852ef694b00d946f91cc10f788e00800000665b0f3862315868f4a95ff9400f78f68f4808eebce00000802000d4c48192558dc3c36645660ff6e9660d3a128f000000767c7cca4f730747da731f071f075fc4027db8d5646736676666430fefb3000000040804f4f30f1a12548fe97882ec") 03:37:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r1, 0xc0104307, 0x0) 03:37:31 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/net\x00') socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x2) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000100)="b15991cd80696852ef694b00d946f91cc10f788e00800000665b0f3862315868f4a95ff9400f78f68f4808eebce00000802000d4c48192558dc3c36645660ff6e9660d3a128f000000767c7cca4f730747da731f071f075fc4027db8d5646736676666430fefb3000000040804f4f30f1a12548fe97882ec") 03:37:31 executing program 0: clone(0x0, &(0x7f0000000040), 0x0, 0x0, 0x0) waitid(0x0, 0x0, &(0x7f0000002ff0), 0x4100000c, 0x0) 03:37:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) lstat(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='lp\x00', 0x2ca) ioctl$int_out(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x500, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/20, 0x14}, {&(0x7f00000018c0)=""/4096, 0x1000}, {&(0x7f0000000080)=""/16, 0x10}, {&(0x7f0000000140)=""/107, 0x6b}], 0x4, &(0x7f00000001c0)=""/65, 0x41}, 0x78}], 0x1, 0x2000, &(0x7f0000000280)={0x0, 0x1c9c380}) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) select(0xfffffffffffffecb, 0x0, 0x0, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0x72516111, 0x100, &(0x7f0000001880), 0xffffff97) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000300)=""/37) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r1, &(0x7f00000008c0)='/', 0x1, 0x0, 0x0, 0x0) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") 03:37:31 executing program 0: clone(0x0, &(0x7f0000000040), 0x0, 0x0, 0x0) waitid(0x0, 0x0, &(0x7f0000002ff0), 0x4100000c, 0x0) 03:37:31 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/net\x00') socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x2) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000100)="b15991cd80696852ef694b00d946f91cc10f788e00800000665b0f3862315868f4a95ff9400f78f68f4808eebce00000802000d4c48192558dc3c36645660ff6e9660d3a128f000000767c7cca4f730747da731f071f075fc4027db8d5646736676666430fefb3000000040804f4f30f1a12548fe97882ec") 03:37:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r1, 0xc0104307, 0x0) [ 376.329829] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:37:31 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/net\x00') socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x2) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000100)="b15991cd80696852ef694b00d946f91cc10f788e00800000665b0f3862315868f4a95ff9400f78f68f4808eebce00000802000d4c48192558dc3c36645660ff6e9660d3a128f000000767c7cca4f730747da731f071f075fc4027db8d5646736676666430fefb3000000040804f4f30f1a12548fe97882ec") 03:37:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) lstat(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='lp\x00', 0x2ca) ioctl$int_out(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x500, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/20, 0x14}, {&(0x7f00000018c0)=""/4096, 0x1000}, {&(0x7f0000000080)=""/16, 0x10}, {&(0x7f0000000140)=""/107, 0x6b}], 0x4, &(0x7f00000001c0)=""/65, 0x41}, 0x78}], 0x1, 0x2000, &(0x7f0000000280)={0x0, 0x1c9c380}) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) select(0xfffffffffffffecb, 0x0, 0x0, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0x72516111, 0x100, &(0x7f0000001880), 0xffffff97) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000300)=""/37) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r1, &(0x7f00000008c0)='/', 0x1, 0x0, 0x0, 0x0) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") 03:37:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r1, 0xc0104307, 0x0) 03:37:31 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) lstat(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='lp\x00', 0x2ca) ioctl$int_out(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x500, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/20, 0x14}, {&(0x7f00000018c0)=""/4096, 0x1000}, {&(0x7f0000000080)=""/16, 0x10}, {&(0x7f0000000140)=""/107, 0x6b}], 0x4, &(0x7f00000001c0)=""/65, 0x41}, 0x78}], 0x1, 0x2000, &(0x7f0000000280)={0x0, 0x1c9c380}) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) select(0xfffffffffffffecb, 0x0, 0x0, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0x72516111, 0x100, &(0x7f0000001880), 0xffffff97) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000300)=""/37) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r1, &(0x7f00000008c0)='/', 0x1, 0x0, 0x0, 0x0) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") [ 376.522988] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:37:31 executing program 0: clone(0x0, &(0x7f0000000040), 0x0, 0x0, 0x0) waitid(0x0, 0x0, &(0x7f0000002ff0), 0x4100000c, 0x0) 03:37:32 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) lstat(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='lp\x00', 0x2ca) ioctl$int_out(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x500, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/20, 0x14}, {&(0x7f00000018c0)=""/4096, 0x1000}, {&(0x7f0000000080)=""/16, 0x10}, {&(0x7f0000000140)=""/107, 0x6b}], 0x4, &(0x7f00000001c0)=""/65, 0x41}, 0x78}], 0x1, 0x2000, &(0x7f0000000280)={0x0, 0x1c9c380}) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) select(0xfffffffffffffecb, 0x0, 0x0, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0x72516111, 0x100, &(0x7f0000001880), 0xffffff97) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000300)=""/37) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r1, &(0x7f00000008c0)='/', 0x1, 0x0, 0x0, 0x0) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") 03:37:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r1, 0xc0104307, 0x0) [ 376.642058] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:37:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) lstat(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='lp\x00', 0x2ca) ioctl$int_out(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x500, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/20, 0x14}, {&(0x7f00000018c0)=""/4096, 0x1000}, {&(0x7f0000000080)=""/16, 0x10}, {&(0x7f0000000140)=""/107, 0x6b}], 0x4, &(0x7f00000001c0)=""/65, 0x41}, 0x78}], 0x1, 0x2000, &(0x7f0000000280)={0x0, 0x1c9c380}) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) select(0xfffffffffffffecb, 0x0, 0x0, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0x72516111, 0x100, &(0x7f0000001880), 0xffffff97) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000300)=""/37) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r1, &(0x7f00000008c0)='/', 0x1, 0x0, 0x0, 0x0) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") [ 376.726833] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 376.824879] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:37:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) lstat(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='lp\x00', 0x2ca) ioctl$int_out(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x500, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/20, 0x14}, {&(0x7f00000018c0)=""/4096, 0x1000}, {&(0x7f0000000080)=""/16, 0x10}, {&(0x7f0000000140)=""/107, 0x6b}], 0x4, &(0x7f00000001c0)=""/65, 0x41}, 0x78}], 0x1, 0x2000, &(0x7f0000000280)={0x0, 0x1c9c380}) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) select(0xfffffffffffffecb, 0x0, 0x0, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0x72516111, 0x100, &(0x7f0000001880), 0xffffff97) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000300)=""/37) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r1, &(0x7f00000008c0)='/', 0x1, 0x0, 0x0, 0x0) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") 03:37:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) lstat(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='lp\x00', 0x2ca) ioctl$int_out(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x500, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/20, 0x14}, {&(0x7f00000018c0)=""/4096, 0x1000}, {&(0x7f0000000080)=""/16, 0x10}, {&(0x7f0000000140)=""/107, 0x6b}], 0x4, &(0x7f00000001c0)=""/65, 0x41}, 0x78}], 0x1, 0x2000, &(0x7f0000000280)={0x0, 0x1c9c380}) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) select(0xfffffffffffffecb, 0x0, 0x0, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0x72516111, 0x100, &(0x7f0000001880), 0xffffff97) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000300)=""/37) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r1, &(0x7f00000008c0)='/', 0x1, 0x0, 0x0, 0x0) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") 03:37:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) lstat(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='lp\x00', 0x2ca) ioctl$int_out(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x500, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/20, 0x14}, {&(0x7f00000018c0)=""/4096, 0x1000}, {&(0x7f0000000080)=""/16, 0x10}, {&(0x7f0000000140)=""/107, 0x6b}], 0x4, &(0x7f00000001c0)=""/65, 0x41}, 0x78}], 0x1, 0x2000, &(0x7f0000000280)={0x0, 0x1c9c380}) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) select(0xfffffffffffffecb, 0x0, 0x0, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0x72516111, 0x100, &(0x7f0000001880), 0xffffff97) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000300)=""/37) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r1, &(0x7f00000008c0)='/', 0x1, 0x0, 0x0, 0x0) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") [ 377.224735] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 377.254261] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 377.257979] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:37:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) lstat(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='lp\x00', 0x2ca) ioctl$int_out(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x500, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/20, 0x14}, {&(0x7f00000018c0)=""/4096, 0x1000}, {&(0x7f0000000080)=""/16, 0x10}, {&(0x7f0000000140)=""/107, 0x6b}], 0x4, &(0x7f00000001c0)=""/65, 0x41}, 0x78}], 0x1, 0x2000, &(0x7f0000000280)={0x0, 0x1c9c380}) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) select(0xfffffffffffffecb, 0x0, 0x0, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0x72516111, 0x100, &(0x7f0000001880), 0xffffff97) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000300)=""/37) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r1, &(0x7f00000008c0)='/', 0x1, 0x0, 0x0, 0x0) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") [ 377.380871] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:37:32 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) lstat(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='lp\x00', 0x2ca) ioctl$int_out(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x500, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/20, 0x14}, {&(0x7f00000018c0)=""/4096, 0x1000}, {&(0x7f0000000080)=""/16, 0x10}, {&(0x7f0000000140)=""/107, 0x6b}], 0x4, &(0x7f00000001c0)=""/65, 0x41}, 0x78}], 0x1, 0x2000, &(0x7f0000000280)={0x0, 0x1c9c380}) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) select(0xfffffffffffffecb, 0x0, 0x0, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0x72516111, 0x100, &(0x7f0000001880), 0xffffff97) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000300)=""/37) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r1, &(0x7f00000008c0)='/', 0x1, 0x0, 0x0, 0x0) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") 03:37:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) lstat(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='lp\x00', 0x2ca) ioctl$int_out(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x500, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/20, 0x14}, {&(0x7f00000018c0)=""/4096, 0x1000}, {&(0x7f0000000080)=""/16, 0x10}, {&(0x7f0000000140)=""/107, 0x6b}], 0x4, &(0x7f00000001c0)=""/65, 0x41}, 0x78}], 0x1, 0x2000, &(0x7f0000000280)={0x0, 0x1c9c380}) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) select(0xfffffffffffffecb, 0x0, 0x0, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0x72516111, 0x100, &(0x7f0000001880), 0xffffff97) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000300)=""/37) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r1, &(0x7f00000008c0)='/', 0x1, 0x0, 0x0, 0x0) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") [ 377.593655] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 377.736946] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:37:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) lstat(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='lp\x00', 0x2ca) ioctl$int_out(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x500, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/20, 0x14}, {&(0x7f00000018c0)=""/4096, 0x1000}, {&(0x7f0000000080)=""/16, 0x10}, {&(0x7f0000000140)=""/107, 0x6b}], 0x4, &(0x7f00000001c0)=""/65, 0x41}, 0x78}], 0x1, 0x2000, &(0x7f0000000280)={0x0, 0x1c9c380}) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) select(0xfffffffffffffecb, 0x0, 0x0, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0x72516111, 0x100, &(0x7f0000001880), 0xffffff97) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000300)=""/37) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r1, &(0x7f00000008c0)='/', 0x1, 0x0, 0x0, 0x0) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") 03:37:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) lstat(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='lp\x00', 0x2ca) ioctl$int_out(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x500, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/20, 0x14}, {&(0x7f00000018c0)=""/4096, 0x1000}, {&(0x7f0000000080)=""/16, 0x10}, {&(0x7f0000000140)=""/107, 0x6b}], 0x4, &(0x7f00000001c0)=""/65, 0x41}, 0x78}], 0x1, 0x2000, &(0x7f0000000280)={0x0, 0x1c9c380}) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) select(0xfffffffffffffecb, 0x0, 0x0, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0x72516111, 0x100, &(0x7f0000001880), 0xffffff97) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000300)=""/37) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r1, &(0x7f00000008c0)='/', 0x1, 0x0, 0x0, 0x0) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") 03:37:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) lstat(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='lp\x00', 0x2ca) ioctl$int_out(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x500, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/20, 0x14}, {&(0x7f00000018c0)=""/4096, 0x1000}, {&(0x7f0000000080)=""/16, 0x10}, {&(0x7f0000000140)=""/107, 0x6b}], 0x4, &(0x7f00000001c0)=""/65, 0x41}, 0x78}], 0x1, 0x2000, &(0x7f0000000280)={0x0, 0x1c9c380}) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) select(0xfffffffffffffecb, 0x0, 0x0, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0x72516111, 0x100, &(0x7f0000001880), 0xffffff97) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000300)=""/37) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r1, &(0x7f00000008c0)='/', 0x1, 0x0, 0x0, 0x0) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") [ 378.075142] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:37:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) lstat(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='lp\x00', 0x2ca) ioctl$int_out(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x500, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/20, 0x14}, {&(0x7f00000018c0)=""/4096, 0x1000}, {&(0x7f0000000080)=""/16, 0x10}, {&(0x7f0000000140)=""/107, 0x6b}], 0x4, &(0x7f00000001c0)=""/65, 0x41}, 0x78}], 0x1, 0x2000, &(0x7f0000000280)={0x0, 0x1c9c380}) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) select(0xfffffffffffffecb, 0x0, 0x0, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0x72516111, 0x100, &(0x7f0000001880), 0xffffff97) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000300)=""/37) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r1, &(0x7f00000008c0)='/', 0x1, 0x0, 0x0, 0x0) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") [ 378.138743] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 378.154100] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 378.261760] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:37:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) lstat(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='lp\x00', 0x2ca) ioctl$int_out(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x500, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/20, 0x14}, {&(0x7f00000018c0)=""/4096, 0x1000}, {&(0x7f0000000080)=""/16, 0x10}, {&(0x7f0000000140)=""/107, 0x6b}], 0x4, &(0x7f00000001c0)=""/65, 0x41}, 0x78}], 0x1, 0x2000, &(0x7f0000000280)={0x0, 0x1c9c380}) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) select(0xfffffffffffffecb, 0x0, 0x0, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0x72516111, 0x100, &(0x7f0000001880), 0xffffff97) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000300)=""/37) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r1, &(0x7f00000008c0)='/', 0x1, 0x0, 0x0, 0x0) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") [ 378.540695] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:37:33 executing program 2: clone(0x0, &(0x7f0000000040), 0x0, 0x0, 0x0) waitid(0x0, 0x0, &(0x7f0000002ff0), 0x4100000c, 0x0) 03:37:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) lstat(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='lp\x00', 0x2ca) ioctl$int_out(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x500, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/20, 0x14}, {&(0x7f00000018c0)=""/4096, 0x1000}, {&(0x7f0000000080)=""/16, 0x10}, {&(0x7f0000000140)=""/107, 0x6b}], 0x4, &(0x7f00000001c0)=""/65, 0x41}, 0x78}], 0x1, 0x2000, &(0x7f0000000280)={0x0, 0x1c9c380}) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) select(0xfffffffffffffecb, 0x0, 0x0, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0x72516111, 0x100, &(0x7f0000001880), 0xffffff97) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000300)=""/37) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r1, &(0x7f00000008c0)='/', 0x1, 0x0, 0x0, 0x0) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") 03:37:34 executing program 2: clone(0x0, &(0x7f0000000040), 0x0, 0x0, 0x0) waitid(0x0, 0x0, &(0x7f0000002ff0), 0x4100000c, 0x0) [ 378.685934] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:37:34 executing program 2: clone(0x0, &(0x7f0000000040), 0x0, 0x0, 0x0) waitid(0x0, 0x0, &(0x7f0000002ff0), 0x4100000c, 0x0) 03:37:34 executing program 1: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x803, 0x0) 03:37:34 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) lstat(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='lp\x00', 0x2ca) ioctl$int_out(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x500, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/20, 0x14}, {&(0x7f00000018c0)=""/4096, 0x1000}, {&(0x7f0000000080)=""/16, 0x10}, {&(0x7f0000000140)=""/107, 0x6b}], 0x4, &(0x7f00000001c0)=""/65, 0x41}, 0x78}], 0x1, 0x2000, &(0x7f0000000280)={0x0, 0x1c9c380}) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) select(0xfffffffffffffecb, 0x0, 0x0, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0x72516111, 0x100, &(0x7f0000001880), 0xffffff97) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000300)=""/37) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r1, &(0x7f00000008c0)='/', 0x1, 0x0, 0x0, 0x0) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") 03:37:34 executing program 1: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x803, 0x0) 03:37:34 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&\xdbA\x1bn\xbcSv\x91->y\xfe\xfa\xfb/\x18g\x80y\xfe\x89\xab\x0e\xab\xac\b\'\xcd', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) 03:37:34 executing program 1: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x803, 0x0) 03:37:34 executing program 3: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x0, 0x0) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) write$P9_RFSYNC(r1, &(0x7f0000000100)={0x7}, 0x7) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) [ 379.084665] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:37:34 executing program 1: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x803, 0x0) 03:37:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x407ffffffa}]}) seccomp(0x0, 0x0, 0x0) 03:37:34 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) listen(r0, 0x0) 03:37:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x407ffffffa}]}) seccomp(0x0, 0x0, 0x0) 03:37:34 executing program 3: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x0, 0x0) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) write$P9_RFSYNC(r1, &(0x7f0000000100)={0x7}, 0x7) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) 03:37:34 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) listen(r0, 0x0) 03:37:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x407ffffffa}]}) seccomp(0x0, 0x0, 0x0) 03:37:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x407ffffffa}]}) seccomp(0x0, 0x0, 0x0) 03:37:35 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) listen(r0, 0x0) 03:37:35 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&\xdbA\x1bn\xbcSv\x91->y\xfe\xfa\xfb/\x18g\x80y\xfe\x89\xab\x0e\xab\xac\b\'\xcd', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) 03:37:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x407ffffffa}]}) seccomp(0x0, 0x0, 0x0) 03:37:35 executing program 3: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x0, 0x0) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) write$P9_RFSYNC(r1, &(0x7f0000000100)={0x7}, 0x7) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) 03:37:35 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) listen(r0, 0x0) 03:37:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x407ffffffa}]}) seccomp(0x0, 0x0, 0x0) 03:37:35 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) listen(r0, 0x0) 03:37:35 executing program 3: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x0, 0x0) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) write$P9_RFSYNC(r1, &(0x7f0000000100)={0x7}, 0x7) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) 03:37:35 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) listen(r0, 0x0) 03:37:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x407ffffffa}]}) seccomp(0x0, 0x0, 0x0) 03:37:35 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&\xdbA\x1bn\xbcSv\x91->y\xfe\xfa\xfb/\x18g\x80y\xfe\x89\xab\x0e\xab\xac\b\'\xcd', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) 03:37:35 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&\xdbA\x1bn\xbcSv\x91->y\xfe\xfa\xfb/\x18g\x80y\xfe\x89\xab\x0e\xab\xac\b\'\xcd', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) 03:37:35 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) listen(r0, 0x0) 03:37:36 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&\xdbA\x1bn\xbcSv\x91->y\xfe\xfa\xfb/\x18g\x80y\xfe\x89\xab\x0e\xab\xac\b\'\xcd', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) 03:37:36 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&\xdbA\x1bn\xbcSv\x91->y\xfe\xfa\xfb/\x18g\x80y\xfe\x89\xab\x0e\xab\xac\b\'\xcd', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) 03:37:36 executing program 5: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x0, 0x0) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) write$P9_RFSYNC(r1, &(0x7f0000000100)={0x7}, 0x7) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) 03:37:36 executing program 3: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x0, 0x0) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) write$P9_RFSYNC(r1, &(0x7f0000000100)={0x7}, 0x7) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) 03:37:36 executing program 3: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x0, 0x0) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) write$P9_RFSYNC(r1, &(0x7f0000000100)={0x7}, 0x7) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) 03:37:36 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&\xdbA\x1bn\xbcSv\x91->y\xfe\xfa\xfb/\x18g\x80y\xfe\x89\xab\x0e\xab\xac\b\'\xcd', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) 03:37:36 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&\xdbA\x1bn\xbcSv\x91->y\xfe\xfa\xfb/\x18g\x80y\xfe\x89\xab\x0e\xab\xac\b\'\xcd', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) 03:37:36 executing program 3: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x0, 0x0) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) write$P9_RFSYNC(r1, &(0x7f0000000100)={0x7}, 0x7) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) 03:37:36 executing program 5: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x0, 0x0) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) write$P9_RFSYNC(r1, &(0x7f0000000100)={0x7}, 0x7) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) 03:37:36 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$kcm(0x29, 0x5, 0x0) syz_execute_func(&(0x7f0000000180)="1c13b5b598cd801b69e4f56962f5696200d9d9d017795bf9f2680c0000008fe9589b26c7e4c753fbc4e101edfec4427d82663ed107c4c2b90a23f2168f4808eebce00000802000c422b18cb6070000005151c4a27d181ec1ea01ef7265dc5f00c35b5b304545e269a8419966030faee42c240f54635bdef2460f5e6061a1e1e0ef26400f0d18c401fe5ff6e30fad6736660fd2938c000000c4c1f913376666450f17720d2e440fc7bf0d000080450fa8") 03:37:36 executing program 5: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x0, 0x0) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) write$P9_RFSYNC(r1, &(0x7f0000000100)={0x7}, 0x7) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) 03:37:36 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$kcm(0x29, 0x5, 0x0) syz_execute_func(&(0x7f0000000180)="1c13b5b598cd801b69e4f56962f5696200d9d9d017795bf9f2680c0000008fe9589b26c7e4c753fbc4e101edfec4427d82663ed107c4c2b90a23f2168f4808eebce00000802000c422b18cb6070000005151c4a27d181ec1ea01ef7265dc5f00c35b5b304545e269a8419966030faee42c240f54635bdef2460f5e6061a1e1e0ef26400f0d18c401fe5ff6e30fad6736660fd2938c000000c4c1f913376666450f17720d2e440fc7bf0d000080450fa8") 03:37:36 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&\xdbA\x1bn\xbcSv\x91->y\xfe\xfa\xfb/\x18g\x80y\xfe\x89\xab\x0e\xab\xac\b\'\xcd', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) 03:37:36 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$kcm(0x29, 0x5, 0x0) syz_execute_func(&(0x7f0000000180)="1c13b5b598cd801b69e4f56962f5696200d9d9d017795bf9f2680c0000008fe9589b26c7e4c753fbc4e101edfec4427d82663ed107c4c2b90a23f2168f4808eebce00000802000c422b18cb6070000005151c4a27d181ec1ea01ef7265dc5f00c35b5b304545e269a8419966030faee42c240f54635bdef2460f5e6061a1e1e0ef26400f0d18c401fe5ff6e30fad6736660fd2938c000000c4c1f913376666450f17720d2e440fc7bf0d000080450fa8") 03:37:36 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$kcm(0x29, 0x5, 0x0) syz_execute_func(&(0x7f0000000180)="1c13b5b598cd801b69e4f56962f5696200d9d9d017795bf9f2680c0000008fe9589b26c7e4c753fbc4e101edfec4427d82663ed107c4c2b90a23f2168f4808eebce00000802000c422b18cb6070000005151c4a27d181ec1ea01ef7265dc5f00c35b5b304545e269a8419966030faee42c240f54635bdef2460f5e6061a1e1e0ef26400f0d18c401fe5ff6e30fad6736660fd2938c000000c4c1f913376666450f17720d2e440fc7bf0d000080450fa8") 03:37:36 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&\xdbA\x1bn\xbcSv\x91->y\xfe\xfa\xfb/\x18g\x80y\xfe\x89\xab\x0e\xab\xac\b\'\xcd', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) 03:37:37 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$kcm(0x29, 0x5, 0x0) syz_execute_func(&(0x7f0000000180)="1c13b5b598cd801b69e4f56962f5696200d9d9d017795bf9f2680c0000008fe9589b26c7e4c753fbc4e101edfec4427d82663ed107c4c2b90a23f2168f4808eebce00000802000c422b18cb6070000005151c4a27d181ec1ea01ef7265dc5f00c35b5b304545e269a8419966030faee42c240f54635bdef2460f5e6061a1e1e0ef26400f0d18c401fe5ff6e30fad6736660fd2938c000000c4c1f913376666450f17720d2e440fc7bf0d000080450fa8") 03:37:37 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&\xdbA\x1bn\xbcSv\x91->y\xfe\xfa\xfb/\x18g\x80y\xfe\x89\xab\x0e\xab\xac\b\'\xcd', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) 03:37:37 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$kcm(0x29, 0x5, 0x0) syz_execute_func(&(0x7f0000000180)="1c13b5b598cd801b69e4f56962f5696200d9d9d017795bf9f2680c0000008fe9589b26c7e4c753fbc4e101edfec4427d82663ed107c4c2b90a23f2168f4808eebce00000802000c422b18cb6070000005151c4a27d181ec1ea01ef7265dc5f00c35b5b304545e269a8419966030faee42c240f54635bdef2460f5e6061a1e1e0ef26400f0d18c401fe5ff6e30fad6736660fd2938c000000c4c1f913376666450f17720d2e440fc7bf0d000080450fa8") 03:37:37 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&\xdbA\x1bn\xbcSv\x91->y\xfe\xfa\xfb/\x18g\x80y\xfe\x89\xab\x0e\xab\xac\b\'\xcd', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) 03:37:37 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$kcm(0x29, 0x5, 0x0) syz_execute_func(&(0x7f0000000180)="1c13b5b598cd801b69e4f56962f5696200d9d9d017795bf9f2680c0000008fe9589b26c7e4c753fbc4e101edfec4427d82663ed107c4c2b90a23f2168f4808eebce00000802000c422b18cb6070000005151c4a27d181ec1ea01ef7265dc5f00c35b5b304545e269a8419966030faee42c240f54635bdef2460f5e6061a1e1e0ef26400f0d18c401fe5ff6e30fad6736660fd2938c000000c4c1f913376666450f17720d2e440fc7bf0d000080450fa8") 03:37:37 executing program 3: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setrlimit(0x4000000007, &(0x7f0000000140)) accept4(r0, 0x0, 0x0, 0x0) 03:37:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3ff, 0x110}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 03:37:37 executing program 3: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setrlimit(0x4000000007, &(0x7f0000000140)) accept4(r0, 0x0, 0x0, 0x0) 03:37:37 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&\xdbA\x1bn\xbcSv\x91->y\xfe\xfa\xfb/\x18g\x80y\xfe\x89\xab\x0e\xab\xac\b\'\xcd', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) 03:37:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3ff, 0x110}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 03:37:37 executing program 3: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setrlimit(0x4000000007, &(0x7f0000000140)) accept4(r0, 0x0, 0x0, 0x0) 03:37:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3ff, 0x110}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 03:37:37 executing program 3: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setrlimit(0x4000000007, &(0x7f0000000140)) accept4(r0, 0x0, 0x0, 0x0) 03:37:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3ff, 0x110}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 03:37:38 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setrlimit(0x4000000007, &(0x7f0000000140)) accept4(r0, 0x0, 0x0, 0x0) 03:37:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3ff, 0x110}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 03:37:38 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setrlimit(0x4000000007, &(0x7f0000000140)) accept4(r0, 0x0, 0x0, 0x0) 03:37:38 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setrlimit(0x4000000007, &(0x7f0000000140)) accept4(r0, 0x0, 0x0, 0x0) 03:37:38 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d00)=@broute={'broute\x00', 0x20, 0x1, 0x188, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000280], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'tunl0\x00', 'team0\x00', 'syzkaller0\x00', @broadcast, [], @empty, [], 0x70, 0xc0, 0xf8}, [@common=@log={'log\x00', 0x28, {{0xb5a, "a123ba18677b00cac57d27fd8ff44710f8416e270c612ff7322f2bc1f783"}}}]}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x200) 03:37:38 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d00)=@broute={'broute\x00', 0x20, 0x1, 0x188, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000280], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'tunl0\x00', 'team0\x00', 'syzkaller0\x00', @broadcast, [], @empty, [], 0x70, 0xc0, 0xf8}, [@common=@log={'log\x00', 0x28, {{0xb5a, "a123ba18677b00cac57d27fd8ff44710f8416e270c612ff7322f2bc1f783"}}}]}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x200) 03:37:38 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d00)=@broute={'broute\x00', 0x20, 0x1, 0x188, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000280], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'tunl0\x00', 'team0\x00', 'syzkaller0\x00', @broadcast, [], @empty, [], 0x70, 0xc0, 0xf8}, [@common=@log={'log\x00', 0x28, {{0xb5a, "a123ba18677b00cac57d27fd8ff44710f8416e270c612ff7322f2bc1f783"}}}]}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x200) 03:37:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3ff, 0x110}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 03:37:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x5, 0x1}]}, &(0x7f0000000100)='GPL\x00'}, 0x48) 03:37:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3ff, 0x110}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 03:37:40 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d00)=@broute={'broute\x00', 0x20, 0x1, 0x188, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000280], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'tunl0\x00', 'team0\x00', 'syzkaller0\x00', @broadcast, [], @empty, [], 0x70, 0xc0, 0xf8}, [@common=@log={'log\x00', 0x28, {{0xb5a, "a123ba18677b00cac57d27fd8ff44710f8416e270c612ff7322f2bc1f783"}}}]}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x200) 03:37:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3ff, 0x110}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 03:37:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x5, 0x1}]}, &(0x7f0000000100)='GPL\x00'}, 0x48) 03:37:41 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000240)) 03:37:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3ff, 0x110}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 03:37:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x5, 0x1}]}, &(0x7f0000000100)='GPL\x00'}, 0x48) 03:37:41 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000240)) 03:37:41 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000240)) 03:37:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x5, 0x1}]}, &(0x7f0000000100)='GPL\x00'}, 0x48) 03:37:43 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000240)) 03:37:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3ff, 0x110}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 03:37:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3ff, 0x110}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 03:37:43 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000240)) 03:37:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3ff, 0x110}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 03:37:44 executing program 4: semop(0x0, &(0x7f0000000140)=[{0x0, 0xfffffffffffefff8}], 0x1) r0 = gettid() timer_create(0x0, &(0x7f0000000280)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000180)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) 03:37:44 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000240)) 03:37:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3ff, 0x110}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 03:37:44 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000240)) 03:37:44 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0_to_bond\x00', &(0x7f0000000040)=@ethtool_cmd={0x26, 0x100}}) 03:37:44 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0_to_bond\x00', &(0x7f0000000040)=@ethtool_cmd={0x26, 0x100}}) 03:37:44 executing program 4: semop(0x0, &(0x7f0000000140)=[{0x0, 0xfffffffffffefff8}], 0x1) r0 = gettid() timer_create(0x0, &(0x7f0000000280)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000180)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) 03:37:44 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0_to_bond\x00', &(0x7f0000000040)=@ethtool_cmd={0x26, 0x100}}) 03:37:46 executing program 4: semop(0x0, &(0x7f0000000140)=[{0x0, 0xfffffffffffefff8}], 0x1) r0 = gettid() timer_create(0x0, &(0x7f0000000280)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000180)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) 03:37:46 executing program 5: semop(0x0, &(0x7f0000000140)=[{0x0, 0xfffffffffffefff8}], 0x1) r0 = gettid() timer_create(0x0, &(0x7f0000000280)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000180)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) 03:37:46 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0_to_bond\x00', &(0x7f0000000040)=@ethtool_cmd={0x26, 0x100}}) 03:37:47 executing program 5: semop(0x0, &(0x7f0000000140)=[{0x0, 0xfffffffffffefff8}], 0x1) r0 = gettid() timer_create(0x0, &(0x7f0000000280)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000180)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) 03:37:47 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7d9288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000001440)="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", 0x290}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008cc0)=[{{0x0, 0xfffffffffffffe06, &(0x7f0000003a40)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1, 0x0, 0x5c}}], 0x1, 0x0, 0x0) 03:37:47 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:47 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x800000c0045009, &(0x7f00000000c0)=0x4) 03:37:47 executing program 4: semop(0x0, &(0x7f0000000140)=[{0x0, 0xfffffffffffefff8}], 0x1) r0 = gettid() timer_create(0x0, &(0x7f0000000280)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000180)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) 03:37:47 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f00000000c0)="982cee0f050520d0f80791b06a4141e2e99643b299b9afc466a4c4660f0f01fc66f66d220f66450f73db0421fc22ebf3440fe645092e41812047002b00009b010149f6ba0dfe8c730c88b4b4d20fbbc4a201458b6a0000008f294001b00b05000073d539f08171a38a806ebb2ac4a0ebe691ae88136560043800004318bedfbecebedfbece00000055c4c26db6e4fb64400f38cd01362e420f65b900800000") clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="02"], 0x1}}, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f00000001c0)={0x0, 0xe89}) 03:37:47 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7d9288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000001440)="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", 0x290}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008cc0)=[{{0x0, 0xfffffffffffffe06, &(0x7f0000003a40)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1, 0x0, 0x5c}}], 0x1, 0x0, 0x0) [ 391.912674] bridge0: port 2(bridge_slave_1) entered disabled state [ 391.920425] bridge0: port 1(bridge_slave_0) entered disabled state 03:37:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7d9288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000001440)="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", 0x290}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008cc0)=[{{0x0, 0xfffffffffffffe06, &(0x7f0000003a40)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1, 0x0, 0x5c}}], 0x1, 0x0, 0x0) 03:37:47 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x800000c0045009, &(0x7f00000000c0)=0x4) 03:37:47 executing program 5: semop(0x0, &(0x7f0000000140)=[{0x0, 0xfffffffffffefff8}], 0x1) r0 = gettid() timer_create(0x0, &(0x7f0000000280)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000180)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) 03:37:47 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7d9288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000001440)="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", 0x290}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008cc0)=[{{0x0, 0xfffffffffffffe06, &(0x7f0000003a40)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1, 0x0, 0x5c}}], 0x1, 0x0, 0x0) [ 392.037915] device bridge_slave_1 left promiscuous mode [ 392.054515] bridge0: port 2(bridge_slave_1) entered disabled state 03:37:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7d9288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000001440)="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", 0x290}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008cc0)=[{{0x0, 0xfffffffffffffe06, &(0x7f0000003a40)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1, 0x0, 0x5c}}], 0x1, 0x0, 0x0) 03:37:47 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x800000c0045009, &(0x7f00000000c0)=0x4) 03:37:47 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f00000000c0)="982cee0f050520d0f80791b06a4141e2e99643b299b9afc466a4c4660f0f01fc66f66d220f66450f73db0421fc22ebf3440fe645092e41812047002b00009b010149f6ba0dfe8c730c88b4b4d20fbbc4a201458b6a0000008f294001b00b05000073d539f08171a38a806ebb2ac4a0ebe691ae88136560043800004318bedfbecebedfbece00000055c4c26db6e4fb64400f38cd01362e420f65b900800000") clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="02"], 0x1}}, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f00000001c0)={0x0, 0xe89}) [ 392.158363] device bridge_slave_0 left promiscuous mode [ 392.190448] bridge0: port 1(bridge_slave_0) entered disabled state 03:37:47 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:47 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f00000000c0)="982cee0f050520d0f80791b06a4141e2e99643b299b9afc466a4c4660f0f01fc66f66d220f66450f73db0421fc22ebf3440fe645092e41812047002b00009b010149f6ba0dfe8c730c88b4b4d20fbbc4a201458b6a0000008f294001b00b05000073d539f08171a38a806ebb2ac4a0ebe691ae88136560043800004318bedfbecebedfbece00000055c4c26db6e4fb64400f38cd01362e420f65b900800000") clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="02"], 0x1}}, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f00000001c0)={0x0, 0xe89}) 03:37:47 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7d9288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000001440)="c9f7e535b9be687ad1288ba55782de3d45e3bcd55bbd8c4847914b415fe4ef3dc90ffb983956a86e2bd5a62525c21a33d7d9c89eab8bd87024d69eb2b9e8efe67ba0ed67660d60184d98b31acb9496d34e10008b8a4ef1627797394b0111c393db8649a3a925abcc1e6ac1e46054d97d13cdacbdf2858bd6c3015ec3d6830bf0fd9a68afbb62f18c181169599c00cbf92fdd3df4c9dc2e72537954adc792030888a85e38682d6837b39a5841da13e3352299cc7017a5e042bc334b00cc10ed107cb97c2b0ef6f6ed770620db8d7fe0668fd6ea4725680e70800d1a480a9ef8d9cfc02403b8ed63d658c9cef30af92dc074328f1ad0f0a1e231e7017b89f492cfb1ea2dbb30b335f651f6e6ea33940d03e6173ec117eae95e87a3f9c96a1619a5e480712626fa0e24dbc33d4a071ebbd9b025bb3bd56ec1303a740aef2cc39d44a4d2524c32be831d617e0077acde9d1a608cb45b2fe908994c9278d24283440bf9439c4b173afaa50588c64a98b22114e2c7897a7053ba1f5a475b64a579b5d2c73e28552d9f0387042baab41bcdf2fd1959706953948813c830c54c8701eebfa85589b0c5e0068d6cba5221bb71b837a2cbaac891643d6603631117c037ab47e8e6ba8ef4e8fa1bf7580ac9a0e62e30f0d5e2307dd656129932ef9c716c21fa44336d9bce83bfcb03635302fc02fa78d40bd57f4ca3046dd5721806a694772208b2bcf45fe3655f28a4d7077c6c29c7d36db26d30d5cd56e88103dc10f63f63850e3361c6fc940f54be61d0dfc04010a4dcc7f2c0dce847adf6f7cb5b9c9acc32ca41ab04215681f2a188291e464d35b6629614396582fa543e76e9601fbc661246c26e1a9764dac2d837d05421c18aeeb618f708a383413650ca262e87f0ea23dd5fc2d119c2e5f4016c8027bfad8d", 0x290}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008cc0)=[{{0x0, 0xfffffffffffffe06, &(0x7f0000003a40)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1, 0x0, 0x5c}}], 0x1, 0x0, 0x0) 03:37:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7d9288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000001440)="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", 0x290}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008cc0)=[{{0x0, 0xfffffffffffffe06, &(0x7f0000003a40)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1, 0x0, 0x5c}}], 0x1, 0x0, 0x0) 03:37:47 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x800000c0045009, &(0x7f00000000c0)=0x4) 03:37:47 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f00000000c0)="982cee0f050520d0f80791b06a4141e2e99643b299b9afc466a4c4660f0f01fc66f66d220f66450f73db0421fc22ebf3440fe645092e41812047002b00009b010149f6ba0dfe8c730c88b4b4d20fbbc4a201458b6a0000008f294001b00b05000073d539f08171a38a806ebb2ac4a0ebe691ae88136560043800004318bedfbecebedfbece00000055c4c26db6e4fb64400f38cd01362e420f65b900800000") clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="02"], 0x1}}, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f00000001c0)={0x0, 0xe89}) 03:37:47 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:47 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:47 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:47 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f00000000c0)="982cee0f050520d0f80791b06a4141e2e99643b299b9afc466a4c4660f0f01fc66f66d220f66450f73db0421fc22ebf3440fe645092e41812047002b00009b010149f6ba0dfe8c730c88b4b4d20fbbc4a201458b6a0000008f294001b00b05000073d539f08171a38a806ebb2ac4a0ebe691ae88136560043800004318bedfbecebedfbece00000055c4c26db6e4fb64400f38cd01362e420f65b900800000") clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="02"], 0x1}}, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f00000001c0)={0x0, 0xe89}) [ 392.591333] bridge0: port 2(bridge_slave_1) entered disabled state [ 392.599521] bridge0: port 1(bridge_slave_0) entered disabled state 03:37:48 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f00000000c0)="982cee0f050520d0f80791b06a4141e2e99643b299b9afc466a4c4660f0f01fc66f66d220f66450f73db0421fc22ebf3440fe645092e41812047002b00009b010149f6ba0dfe8c730c88b4b4d20fbbc4a201458b6a0000008f294001b00b05000073d539f08171a38a806ebb2ac4a0ebe691ae88136560043800004318bedfbecebedfbece00000055c4c26db6e4fb64400f38cd01362e420f65b900800000") clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="02"], 0x1}}, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f00000001c0)={0x0, 0xe89}) [ 392.671915] bridge0: port 2(bridge_slave_1) entered disabled state [ 392.679817] bridge0: port 1(bridge_slave_0) entered disabled state [ 392.788322] bridge0: port 2(bridge_slave_1) entered disabled state [ 392.796568] bridge0: port 1(bridge_slave_0) entered disabled state 03:37:48 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) [ 392.869569] device bridge_slave_1 left promiscuous mode [ 392.884235] bridge0: port 2(bridge_slave_1) entered disabled state [ 392.943589] device bridge_slave_0 left promiscuous mode [ 392.949315] bridge0: port 1(bridge_slave_0) entered disabled state 03:37:48 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="140000080003ffff00000000000000000000a5ce1577f94fe19a69cdb3d821197a1a4b18df3d104f02de27574925ab9b00009edc9d03d04aa27681c11d7e4ad11f6663adb19e4363a01d6d89ea93d8f4d4c622600a19efbc7001d7b81e1a36163d0aa2976d1f5e451bd076c662f7899066ece907362366ade6fddd2e955489b7d79d8a794b66231720ea812977a6a7812cf8a8de7d944fa2fe06b3e3863968a28d2a2347f119c48d239d6b28b7e148c64f26a16ca292fe8d4c212bef83570fbd76ab7a70fbe21a3030a387923610be630242153e0d6c43c5c12da515f654cf1327df9fff389b9b950359e03cc0fb18fc34afcce497c4fe5dc7edf8dbe1bbee594a0d1f000a416500a04e29de1a1f7727c77378345da8641a15e3717060a3ed7e4ea87279ddcf974cf069bbe86f7da3b84df6ac463bc254d9c5b85725195eb7a735b2e0b38bc2a7dffcb6f8cd85212f68dbc3ca7e66a23420ff00cae7f618c1220cd091c41b219d1d2d89ba5b53d73cebd0adaaeb0c44b8b817ea7f7c6647c12ec7bba289cc652ab8e9cde7b0edec124365d46c80fb2874834528c4675eff6866"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:48 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f00000000c0)="982cee0f050520d0f80791b06a4141e2e99643b299b9afc466a4c4660f0f01fc66f66d220f66450f73db0421fc22ebf3440fe645092e41812047002b00009b010149f6ba0dfe8c730c88b4b4d20fbbc4a201458b6a0000008f294001b00b05000073d539f08171a38a806ebb2ac4a0ebe691ae88136560043800004318bedfbecebedfbece00000055c4c26db6e4fb64400f38cd01362e420f65b900800000") clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="02"], 0x1}}, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f00000001c0)={0x0, 0xe89}) [ 393.019697] bridge0: port 2(bridge_slave_1) entered disabled state [ 393.027996] bridge0: port 1(bridge_slave_0) entered disabled state [ 393.091526] device bridge_slave_1 left promiscuous mode [ 393.110367] bridge0: port 2(bridge_slave_1) entered disabled state 03:37:48 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) [ 393.184143] device bridge_slave_0 left promiscuous mode [ 393.189743] bridge0: port 1(bridge_slave_0) entered disabled state 03:37:48 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) [ 393.276566] bridge0: port 2(bridge_slave_1) entered disabled state [ 393.284749] bridge0: port 1(bridge_slave_0) entered disabled state [ 393.323061] device bridge_slave_1 left promiscuous mode [ 393.340881] bridge0: port 2(bridge_slave_1) entered disabled state [ 393.391339] device bridge_slave_0 left promiscuous mode [ 393.397080] bridge0: port 1(bridge_slave_0) entered disabled state 03:37:48 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="140000080003ffff00000000000000000000a5ce1577f94fe19a69cdb3d821197a1a4b18df3d104f02de27574925ab9b00009edc9d03d04aa27681c11d7e4ad11f6663adb19e4363a01d6d89ea93d8f4d4c622600a19efbc7001d7b81e1a36163d0aa2976d1f5e451bd076c662f7899066ece907362366ade6fddd2e955489b7d79d8a794b66231720ea812977a6a7812cf8a8de7d944fa2fe06b3e3863968a28d2a2347f119c48d239d6b28b7e148c64f26a16ca292fe8d4c212bef83570fbd76ab7a70fbe21a3030a387923610be630242153e0d6c43c5c12da515f654cf1327df9fff389b9b950359e03cc0fb18fc34afcce497c4fe5dc7edf8dbe1bbee594a0d1f000a416500a04e29de1a1f7727c77378345da8641a15e3717060a3ed7e4ea87279ddcf974cf069bbe86f7da3b84df6ac463bc254d9c5b85725195eb7a735b2e0b38bc2a7dffcb6f8cd85212f68dbc3ca7e66a23420ff00cae7f618c1220cd091c41b219d1d2d89ba5b53d73cebd0adaaeb0c44b8b817ea7f7c6647c12ec7bba289cc652ab8e9cde7b0edec124365d46c80fb2874834528c4675eff6866"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:48 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) [ 393.544965] device bridge_slave_1 left promiscuous mode [ 393.551150] bridge0: port 2(bridge_slave_1) entered disabled state [ 393.588357] device bridge_slave_0 left promiscuous mode [ 393.594629] bridge0: port 1(bridge_slave_0) entered disabled state [ 393.730455] device bridge_slave_1 left promiscuous mode [ 393.736599] bridge0: port 2(bridge_slave_1) entered disabled state [ 393.791088] device bridge_slave_0 left promiscuous mode [ 393.796747] bridge0: port 1(bridge_slave_0) entered disabled state 03:37:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:49 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:49 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:49 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="140000080003ffff00000000000000000000a5ce1577f94fe19a69cdb3d821197a1a4b18df3d104f02de27574925ab9b00009edc9d03d04aa27681c11d7e4ad11f6663adb19e4363a01d6d89ea93d8f4d4c622600a19efbc7001d7b81e1a36163d0aa2976d1f5e451bd076c662f7899066ece907362366ade6fddd2e955489b7d79d8a794b66231720ea812977a6a7812cf8a8de7d944fa2fe06b3e3863968a28d2a2347f119c48d239d6b28b7e148c64f26a16ca292fe8d4c212bef83570fbd76ab7a70fbe21a3030a387923610be630242153e0d6c43c5c12da515f654cf1327df9fff389b9b950359e03cc0fb18fc34afcce497c4fe5dc7edf8dbe1bbee594a0d1f000a416500a04e29de1a1f7727c77378345da8641a15e3717060a3ed7e4ea87279ddcf974cf069bbe86f7da3b84df6ac463bc254d9c5b85725195eb7a735b2e0b38bc2a7dffcb6f8cd85212f68dbc3ca7e66a23420ff00cae7f618c1220cd091c41b219d1d2d89ba5b53d73cebd0adaaeb0c44b8b817ea7f7c6647c12ec7bba289cc652ab8e9cde7b0edec124365d46c80fb2874834528c4675eff6866"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:49 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:49 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="140000080003ffff00000000000000000000a5ce1577f94fe19a69cdb3d821197a1a4b18df3d104f02de27574925ab9b00009edc9d03d04aa27681c11d7e4ad11f6663adb19e4363a01d6d89ea93d8f4d4c622600a19efbc7001d7b81e1a36163d0aa2976d1f5e451bd076c662f7899066ece907362366ade6fddd2e955489b7d79d8a794b66231720ea812977a6a7812cf8a8de7d944fa2fe06b3e3863968a28d2a2347f119c48d239d6b28b7e148c64f26a16ca292fe8d4c212bef83570fbd76ab7a70fbe21a3030a387923610be630242153e0d6c43c5c12da515f654cf1327df9fff389b9b950359e03cc0fb18fc34afcce497c4fe5dc7edf8dbe1bbee594a0d1f000a416500a04e29de1a1f7727c77378345da8641a15e3717060a3ed7e4ea87279ddcf974cf069bbe86f7da3b84df6ac463bc254d9c5b85725195eb7a735b2e0b38bc2a7dffcb6f8cd85212f68dbc3ca7e66a23420ff00cae7f618c1220cd091c41b219d1d2d89ba5b53d73cebd0adaaeb0c44b8b817ea7f7c6647c12ec7bba289cc652ab8e9cde7b0edec124365d46c80fb2874834528c4675eff6866"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:49 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:49 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="140000080003ffff00000000000000000000a5ce1577f94fe19a69cdb3d821197a1a4b18df3d104f02de27574925ab9b00009edc9d03d04aa27681c11d7e4ad11f6663adb19e4363a01d6d89ea93d8f4d4c622600a19efbc7001d7b81e1a36163d0aa2976d1f5e451bd076c662f7899066ece907362366ade6fddd2e955489b7d79d8a794b66231720ea812977a6a7812cf8a8de7d944fa2fe06b3e3863968a28d2a2347f119c48d239d6b28b7e148c64f26a16ca292fe8d4c212bef83570fbd76ab7a70fbe21a3030a387923610be630242153e0d6c43c5c12da515f654cf1327df9fff389b9b950359e03cc0fb18fc34afcce497c4fe5dc7edf8dbe1bbee594a0d1f000a416500a04e29de1a1f7727c77378345da8641a15e3717060a3ed7e4ea87279ddcf974cf069bbe86f7da3b84df6ac463bc254d9c5b85725195eb7a735b2e0b38bc2a7dffcb6f8cd85212f68dbc3ca7e66a23420ff00cae7f618c1220cd091c41b219d1d2d89ba5b53d73cebd0adaaeb0c44b8b817ea7f7c6647c12ec7bba289cc652ab8e9cde7b0edec124365d46c80fb2874834528c4675eff6866"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:49 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:49 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:49 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:49 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:49 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:49 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:49 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="140000080003ffff00000000000000000000a5ce1577f94fe19a69cdb3d821197a1a4b18df3d104f02de27574925ab9b00009edc9d03d04aa27681c11d7e4ad11f6663adb19e4363a01d6d89ea93d8f4d4c622600a19efbc7001d7b81e1a36163d0aa2976d1f5e451bd076c662f7899066ece907362366ade6fddd2e955489b7d79d8a794b66231720ea812977a6a7812cf8a8de7d944fa2fe06b3e3863968a28d2a2347f119c48d239d6b28b7e148c64f26a16ca292fe8d4c212bef83570fbd76ab7a70fbe21a3030a387923610be630242153e0d6c43c5c12da515f654cf1327df9fff389b9b950359e03cc0fb18fc34afcce497c4fe5dc7edf8dbe1bbee594a0d1f000a416500a04e29de1a1f7727c77378345da8641a15e3717060a3ed7e4ea87279ddcf974cf069bbe86f7da3b84df6ac463bc254d9c5b85725195eb7a735b2e0b38bc2a7dffcb6f8cd85212f68dbc3ca7e66a23420ff00cae7f618c1220cd091c41b219d1d2d89ba5b53d73cebd0adaaeb0c44b8b817ea7f7c6647c12ec7bba289cc652ab8e9cde7b0edec124365d46c80fb2874834528c4675eff6866"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:49 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="140000080003ffff00000000000000000000a5ce1577f94fe19a69cdb3d821197a1a4b18df3d104f02de27574925ab9b00009edc9d03d04aa27681c11d7e4ad11f6663adb19e4363a01d6d89ea93d8f4d4c622600a19efbc7001d7b81e1a36163d0aa2976d1f5e451bd076c662f7899066ece907362366ade6fddd2e955489b7d79d8a794b66231720ea812977a6a7812cf8a8de7d944fa2fe06b3e3863968a28d2a2347f119c48d239d6b28b7e148c64f26a16ca292fe8d4c212bef83570fbd76ab7a70fbe21a3030a387923610be630242153e0d6c43c5c12da515f654cf1327df9fff389b9b950359e03cc0fb18fc34afcce497c4fe5dc7edf8dbe1bbee594a0d1f000a416500a04e29de1a1f7727c77378345da8641a15e3717060a3ed7e4ea87279ddcf974cf069bbe86f7da3b84df6ac463bc254d9c5b85725195eb7a735b2e0b38bc2a7dffcb6f8cd85212f68dbc3ca7e66a23420ff00cae7f618c1220cd091c41b219d1d2d89ba5b53d73cebd0adaaeb0c44b8b817ea7f7c6647c12ec7bba289cc652ab8e9cde7b0edec124365d46c80fb2874834528c4675eff6866"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="140000080003ffff00000000000000000000a5ce1577f94fe19a69cdb3d821197a1a4b18df3d104f02de27574925ab9b00009edc9d03d04aa27681c11d7e4ad11f6663adb19e4363a01d6d89ea93d8f4d4c622600a19efbc7001d7b81e1a36163d0aa2976d1f5e451bd076c662f7899066ece907362366ade6fddd2e955489b7d79d8a794b66231720ea812977a6a7812cf8a8de7d944fa2fe06b3e3863968a28d2a2347f119c48d239d6b28b7e148c64f26a16ca292fe8d4c212bef83570fbd76ab7a70fbe21a3030a387923610be630242153e0d6c43c5c12da515f654cf1327df9fff389b9b950359e03cc0fb18fc34afcce497c4fe5dc7edf8dbe1bbee594a0d1f000a416500a04e29de1a1f7727c77378345da8641a15e3717060a3ed7e4ea87279ddcf974cf069bbe86f7da3b84df6ac463bc254d9c5b85725195eb7a735b2e0b38bc2a7dffcb6f8cd85212f68dbc3ca7e66a23420ff00cae7f618c1220cd091c41b219d1d2d89ba5b53d73cebd0adaaeb0c44b8b817ea7f7c6647c12ec7bba289cc652ab8e9cde7b0edec124365d46c80fb2874834528c4675eff6866"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:50 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:50 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="140000080003ffff00000000000000000000a5ce1577f94fe19a69cdb3d821197a1a4b18df3d104f02de27574925ab9b00009edc9d03d04aa27681c11d7e4ad11f6663adb19e4363a01d6d89ea93d8f4d4c622600a19efbc7001d7b81e1a36163d0aa2976d1f5e451bd076c662f7899066ece907362366ade6fddd2e955489b7d79d8a794b66231720ea812977a6a7812cf8a8de7d944fa2fe06b3e3863968a28d2a2347f119c48d239d6b28b7e148c64f26a16ca292fe8d4c212bef83570fbd76ab7a70fbe21a3030a387923610be630242153e0d6c43c5c12da515f654cf1327df9fff389b9b950359e03cc0fb18fc34afcce497c4fe5dc7edf8dbe1bbee594a0d1f000a416500a04e29de1a1f7727c77378345da8641a15e3717060a3ed7e4ea87279ddcf974cf069bbe86f7da3b84df6ac463bc254d9c5b85725195eb7a735b2e0b38bc2a7dffcb6f8cd85212f68dbc3ca7e66a23420ff00cae7f618c1220cd091c41b219d1d2d89ba5b53d73cebd0adaaeb0c44b8b817ea7f7c6647c12ec7bba289cc652ab8e9cde7b0edec124365d46c80fb2874834528c4675eff6866"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:50 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:50 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:50 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:50 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:50 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="140000080003ffff00000000000000000000a5ce1577f94fe19a69cdb3d821197a1a4b18df3d104f02de27574925ab9b00009edc9d03d04aa27681c11d7e4ad11f6663adb19e4363a01d6d89ea93d8f4d4c622600a19efbc7001d7b81e1a36163d0aa2976d1f5e451bd076c662f7899066ece907362366ade6fddd2e955489b7d79d8a794b66231720ea812977a6a7812cf8a8de7d944fa2fe06b3e3863968a28d2a2347f119c48d239d6b28b7e148c64f26a16ca292fe8d4c212bef83570fbd76ab7a70fbe21a3030a387923610be630242153e0d6c43c5c12da515f654cf1327df9fff389b9b950359e03cc0fb18fc34afcce497c4fe5dc7edf8dbe1bbee594a0d1f000a416500a04e29de1a1f7727c77378345da8641a15e3717060a3ed7e4ea87279ddcf974cf069bbe86f7da3b84df6ac463bc254d9c5b85725195eb7a735b2e0b38bc2a7dffcb6f8cd85212f68dbc3ca7e66a23420ff00cae7f618c1220cd091c41b219d1d2d89ba5b53d73cebd0adaaeb0c44b8b817ea7f7c6647c12ec7bba289cc652ab8e9cde7b0edec124365d46c80fb2874834528c4675eff6866"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:50 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:50 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:50 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="140000080003ffff00000000000000000000a5ce1577f94fe19a69cdb3d821197a1a4b18df3d104f02de27574925ab9b00009edc9d03d04aa27681c11d7e4ad11f6663adb19e4363a01d6d89ea93d8f4d4c622600a19efbc7001d7b81e1a36163d0aa2976d1f5e451bd076c662f7899066ece907362366ade6fddd2e955489b7d79d8a794b66231720ea812977a6a7812cf8a8de7d944fa2fe06b3e3863968a28d2a2347f119c48d239d6b28b7e148c64f26a16ca292fe8d4c212bef83570fbd76ab7a70fbe21a3030a387923610be630242153e0d6c43c5c12da515f654cf1327df9fff389b9b950359e03cc0fb18fc34afcce497c4fe5dc7edf8dbe1bbee594a0d1f000a416500a04e29de1a1f7727c77378345da8641a15e3717060a3ed7e4ea87279ddcf974cf069bbe86f7da3b84df6ac463bc254d9c5b85725195eb7a735b2e0b38bc2a7dffcb6f8cd85212f68dbc3ca7e66a23420ff00cae7f618c1220cd091c41b219d1d2d89ba5b53d73cebd0adaaeb0c44b8b817ea7f7c6647c12ec7bba289cc652ab8e9cde7b0edec124365d46c80fb2874834528c4675eff6866"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:50 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:50 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:50 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:50 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:50 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="140000080003ffff00000000000000000000a5ce1577f94fe19a69cdb3d821197a1a4b18df3d104f02de27574925ab9b00009edc9d03d04aa27681c11d7e4ad11f6663adb19e4363a01d6d89ea93d8f4d4c622600a19efbc7001d7b81e1a36163d0aa2976d1f5e451bd076c662f7899066ece907362366ade6fddd2e955489b7d79d8a794b66231720ea812977a6a7812cf8a8de7d944fa2fe06b3e3863968a28d2a2347f119c48d239d6b28b7e148c64f26a16ca292fe8d4c212bef83570fbd76ab7a70fbe21a3030a387923610be630242153e0d6c43c5c12da515f654cf1327df9fff389b9b950359e03cc0fb18fc34afcce497c4fe5dc7edf8dbe1bbee594a0d1f000a416500a04e29de1a1f7727c77378345da8641a15e3717060a3ed7e4ea87279ddcf974cf069bbe86f7da3b84df6ac463bc254d9c5b85725195eb7a735b2e0b38bc2a7dffcb6f8cd85212f68dbc3ca7e66a23420ff00cae7f618c1220cd091c41b219d1d2d89ba5b53d73cebd0adaaeb0c44b8b817ea7f7c6647c12ec7bba289cc652ab8e9cde7b0edec124365d46c80fb2874834528c4675eff6866"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:50 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:50 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="140000080003ffff00000000000000000000a5ce1577f94fe19a69cdb3d821197a1a4b18df3d104f02de27574925ab9b00009edc9d03d04aa27681c11d7e4ad11f6663adb19e4363a01d6d89ea93d8f4d4c622600a19efbc7001d7b81e1a36163d0aa2976d1f5e451bd076c662f7899066ece907362366ade6fddd2e955489b7d79d8a794b66231720ea812977a6a7812cf8a8de7d944fa2fe06b3e3863968a28d2a2347f119c48d239d6b28b7e148c64f26a16ca292fe8d4c212bef83570fbd76ab7a70fbe21a3030a387923610be630242153e0d6c43c5c12da515f654cf1327df9fff389b9b950359e03cc0fb18fc34afcce497c4fe5dc7edf8dbe1bbee594a0d1f000a416500a04e29de1a1f7727c77378345da8641a15e3717060a3ed7e4ea87279ddcf974cf069bbe86f7da3b84df6ac463bc254d9c5b85725195eb7a735b2e0b38bc2a7dffcb6f8cd85212f68dbc3ca7e66a23420ff00cae7f618c1220cd091c41b219d1d2d89ba5b53d73cebd0adaaeb0c44b8b817ea7f7c6647c12ec7bba289cc652ab8e9cde7b0edec124365d46c80fb2874834528c4675eff6866"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:50 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:50 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:50 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:51 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:51 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:51 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x800000c0045009, &(0x7f00000000c0)=0x4) 03:37:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7d9288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000001440)="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", 0x290}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008cc0)=[{{0x0, 0xfffffffffffffe06, &(0x7f0000003a40)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1, 0x0, 0x5c}}], 0x1, 0x0, 0x0) 03:37:51 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="140000080003ffff00000000000000000000a5ce1577f94fe19a69cdb3d821197a1a4b18df3d104f02de27574925ab9b00009edc9d03d04aa27681c11d7e4ad11f6663adb19e4363a01d6d89ea93d8f4d4c622600a19efbc7001d7b81e1a36163d0aa2976d1f5e451bd076c662f7899066ece907362366ade6fddd2e955489b7d79d8a794b66231720ea812977a6a7812cf8a8de7d944fa2fe06b3e3863968a28d2a2347f119c48d239d6b28b7e148c64f26a16ca292fe8d4c212bef83570fbd76ab7a70fbe21a3030a387923610be630242153e0d6c43c5c12da515f654cf1327df9fff389b9b950359e03cc0fb18fc34afcce497c4fe5dc7edf8dbe1bbee594a0d1f000a416500a04e29de1a1f7727c77378345da8641a15e3717060a3ed7e4ea87279ddcf974cf069bbe86f7da3b84df6ac463bc254d9c5b85725195eb7a735b2e0b38bc2a7dffcb6f8cd85212f68dbc3ca7e66a23420ff00cae7f618c1220cd091c41b219d1d2d89ba5b53d73cebd0adaaeb0c44b8b817ea7f7c6647c12ec7bba289cc652ab8e9cde7b0edec124365d46c80fb2874834528c4675eff6866"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:51 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7d9288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000001440)="c9f7e535b9be687ad1288ba55782de3d45e3bcd55bbd8c4847914b415fe4ef3dc90ffb983956a86e2bd5a62525c21a33d7d9c89eab8bd87024d69eb2b9e8efe67ba0ed67660d60184d98b31acb9496d34e10008b8a4ef1627797394b0111c393db8649a3a925abcc1e6ac1e46054d97d13cdacbdf2858bd6c3015ec3d6830bf0fd9a68afbb62f18c181169599c00cbf92fdd3df4c9dc2e72537954adc792030888a85e38682d6837b39a5841da13e3352299cc7017a5e042bc334b00cc10ed107cb97c2b0ef6f6ed770620db8d7fe0668fd6ea4725680e70800d1a480a9ef8d9cfc02403b8ed63d658c9cef30af92dc074328f1ad0f0a1e231e7017b89f492cfb1ea2dbb30b335f651f6e6ea33940d03e6173ec117eae95e87a3f9c96a1619a5e480712626fa0e24dbc33d4a071ebbd9b025bb3bd56ec1303a740aef2cc39d44a4d2524c32be831d617e0077acde9d1a608cb45b2fe908994c9278d24283440bf9439c4b173afaa50588c64a98b22114e2c7897a7053ba1f5a475b64a579b5d2c73e28552d9f0387042baab41bcdf2fd1959706953948813c830c54c8701eebfa85589b0c5e0068d6cba5221bb71b837a2cbaac891643d6603631117c037ab47e8e6ba8ef4e8fa1bf7580ac9a0e62e30f0d5e2307dd656129932ef9c716c21fa44336d9bce83bfcb03635302fc02fa78d40bd57f4ca3046dd5721806a694772208b2bcf45fe3655f28a4d7077c6c29c7d36db26d30d5cd56e88103dc10f63f63850e3361c6fc940f54be61d0dfc04010a4dcc7f2c0dce847adf6f7cb5b9c9acc32ca41ab04215681f2a188291e464d35b6629614396582fa543e76e9601fbc661246c26e1a9764dac2d837d05421c18aeeb618f708a383413650ca262e87f0ea23dd5fc2d119c2e5f4016c8027bfad8d", 0x290}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008cc0)=[{{0x0, 0xfffffffffffffe06, &(0x7f0000003a40)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1, 0x0, 0x5c}}], 0x1, 0x0, 0x0) 03:37:51 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x800000c0045009, &(0x7f00000000c0)=0x4) 03:37:51 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7d9288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000001440)="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", 0x290}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008cc0)=[{{0x0, 0xfffffffffffffe06, &(0x7f0000003a40)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1, 0x0, 0x5c}}], 0x1, 0x0, 0x0) 03:37:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7d9288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000001440)="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", 0x290}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008cc0)=[{{0x0, 0xfffffffffffffe06, &(0x7f0000003a40)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1, 0x0, 0x5c}}], 0x1, 0x0, 0x0) 03:37:51 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7d9288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000001440)="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", 0x290}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008cc0)=[{{0x0, 0xfffffffffffffe06, &(0x7f0000003a40)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1, 0x0, 0x5c}}], 0x1, 0x0, 0x0) 03:37:51 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7d9288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000001440)="c9f7e535b9be687ad1288ba55782de3d45e3bcd55bbd8c4847914b415fe4ef3dc90ffb983956a86e2bd5a62525c21a33d7d9c89eab8bd87024d69eb2b9e8efe67ba0ed67660d60184d98b31acb9496d34e10008b8a4ef1627797394b0111c393db8649a3a925abcc1e6ac1e46054d97d13cdacbdf2858bd6c3015ec3d6830bf0fd9a68afbb62f18c181169599c00cbf92fdd3df4c9dc2e72537954adc792030888a85e38682d6837b39a5841da13e3352299cc7017a5e042bc334b00cc10ed107cb97c2b0ef6f6ed770620db8d7fe0668fd6ea4725680e70800d1a480a9ef8d9cfc02403b8ed63d658c9cef30af92dc074328f1ad0f0a1e231e7017b89f492cfb1ea2dbb30b335f651f6e6ea33940d03e6173ec117eae95e87a3f9c96a1619a5e480712626fa0e24dbc33d4a071ebbd9b025bb3bd56ec1303a740aef2cc39d44a4d2524c32be831d617e0077acde9d1a608cb45b2fe908994c9278d24283440bf9439c4b173afaa50588c64a98b22114e2c7897a7053ba1f5a475b64a579b5d2c73e28552d9f0387042baab41bcdf2fd1959706953948813c830c54c8701eebfa85589b0c5e0068d6cba5221bb71b837a2cbaac891643d6603631117c037ab47e8e6ba8ef4e8fa1bf7580ac9a0e62e30f0d5e2307dd656129932ef9c716c21fa44336d9bce83bfcb03635302fc02fa78d40bd57f4ca3046dd5721806a694772208b2bcf45fe3655f28a4d7077c6c29c7d36db26d30d5cd56e88103dc10f63f63850e3361c6fc940f54be61d0dfc04010a4dcc7f2c0dce847adf6f7cb5b9c9acc32ca41ab04215681f2a188291e464d35b6629614396582fa543e76e9601fbc661246c26e1a9764dac2d837d05421c18aeeb618f708a383413650ca262e87f0ea23dd5fc2d119c2e5f4016c8027bfad8d", 0x290}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008cc0)=[{{0x0, 0xfffffffffffffe06, &(0x7f0000003a40)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1, 0x0, 0x5c}}], 0x1, 0x0, 0x0) 03:37:51 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7d9288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000001440)="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", 0x290}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008cc0)=[{{0x0, 0xfffffffffffffe06, &(0x7f0000003a40)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1, 0x0, 0x5c}}], 0x1, 0x0, 0x0) 03:37:51 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7d9288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000001440)="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", 0x290}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008cc0)=[{{0x0, 0xfffffffffffffe06, &(0x7f0000003a40)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1, 0x0, 0x5c}}], 0x1, 0x0, 0x0) 03:37:51 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000880)='sysfs\x00^\x04\xdc:\x00\xc2\xa4\xd8j\xd8~*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9b^\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\x01\"\xc8U0%\xa2X9\\\x92QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5B@5CZ=\xbbv\xc5}