ive=1 [ 315.346774] overlayfs: filesystem on './file0' not supported as upperdir [ 315.407675] audit: type=1400 audit(2000000190.660:130): avc: denied { node_bind } for pid=18262 comm="syz-executor.4" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:node_t:s0 tclass=dccp_socket permissive=1 [ 315.463146] audit: type=1400 audit(2000000190.700:131): avc: denied { name_connect } for pid=18262 comm="syz-executor.4" dest=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 03:36:30 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000000c0)="9834620f050520d0f80791b0124141e2e9964180bf108a6796fbc4237909a200800000e666f66d220fa0e5be34d1c4e1f8c421fcc4e101167c5c8ed72e41812047002b0000006e46f18888a1c4101f9b9b73e2571616c4029d027cb2f1100000ad808f2940c44219a775d0f08171a38a806ebb40da9ce5570000008ca065600000c4618de3c0740f2d9600000000cadcdcf340ad0142c4c4a241afa1fbffffff097531313131fba1c9fb110f0f3804830a000000") 03:36:30 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001540)='/dev/btrfs-control\x00', 0x294000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname(r0, 0x0, &(0x7f00000014c0)) 03:36:30 executing program 0: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000340)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x3) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000080)={0x3, 0x0, 0x1, 0x0, 0x0, 0x9}) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0xfffffffffffffec2) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) open$dir(0x0, 0x0, 0x10) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:36:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000600)) r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000480)) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000000)={0x100000000, 0x400, [0x7, 0x64, 0x5, 0x7fff, 0x3f], 0x2}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') 03:36:31 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001540)='/dev/btrfs-control\x00', 0x294000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname(r0, 0x0, &(0x7f00000014c0)) 03:36:31 executing program 0: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000340)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x3) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000080)={0x3, 0x0, 0x1, 0x0, 0x0, 0x9}) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0xfffffffffffffec2) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) open$dir(0x0, 0x0, 0x10) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:36:31 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001540)='/dev/btrfs-control\x00', 0x294000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname(r0, 0x0, &(0x7f00000014c0)) 03:36:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 03:36:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000600)) r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000480)) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000000)={0x100000000, 0x400, [0x7, 0x64, 0x5, 0x7fff, 0x3f], 0x2}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') 03:36:31 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000000c0)="9834620f050520d0f80791b0124141e2e9964180bf108a6796fbc4237909a200800000e666f66d220fa0e5be34d1c4e1f8c421fcc4e101167c5c8ed72e41812047002b0000006e46f18888a1c4101f9b9b73e2571616c4029d027cb2f1100000ad808f2940c44219a775d0f08171a38a806ebb40da9ce5570000008ca065600000c4618de3c0740f2d9600000000cadcdcf340ad0142c4c4a241afa1fbffffff097531313131fba1c9fb110f0f3804830a000000") 03:36:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000600)) r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000480)) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000000)={0x100000000, 0x400, [0x7, 0x64, 0x5, 0x7fff, 0x3f], 0x2}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') 03:36:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000600)) r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000480)) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000000)={0x100000000, 0x400, [0x7, 0x64, 0x5, 0x7fff, 0x3f], 0x2}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') 03:36:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000600)) r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000480)) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000000)={0x100000000, 0x400, [0x7, 0x64, 0x5, 0x7fff, 0x3f], 0x2}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') 03:36:31 executing program 4: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 03:36:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000600)) r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000480)) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000000)={0x100000000, 0x400, [0x7, 0x64, 0x5, 0x7fff, 0x3f], 0x2}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') 03:36:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000600)) r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000480)) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000000)={0x100000000, 0x400, [0x7, 0x64, 0x5, 0x7fff, 0x3f], 0x2}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') 03:36:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000600)) r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000480)) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000000)={0x100000000, 0x400, [0x7, 0x64, 0x5, 0x7fff, 0x3f], 0x2}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') 03:36:32 executing program 3: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:32 executing program 1: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000600)) r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000480)) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000000)={0x100000000, 0x400, [0x7, 0x64, 0x5, 0x7fff, 0x3f], 0x2}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') 03:36:32 executing program 4: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:32 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000000c0)="9834620f050520d0f80791b0124141e2e9964180bf108a6796fbc4237909a200800000e666f66d220fa0e5be34d1c4e1f8c421fcc4e101167c5c8ed72e41812047002b0000006e46f18888a1c4101f9b9b73e2571616c4029d027cb2f1100000ad808f2940c44219a775d0f08171a38a806ebb40da9ce5570000008ca065600000c4618de3c0740f2d9600000000cadcdcf340ad0142c4c4a241afa1fbffffff097531313131fba1c9fb110f0f3804830a000000") 03:36:32 executing program 0: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:33 executing program 5: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:33 executing program 0: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:33 executing program 3: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:33 executing program 1: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:33 executing program 4: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:34 executing program 2: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:34 executing program 1: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:34 executing program 5: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:34 executing program 2: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:34 executing program 0: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:34 executing program 1: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:34 executing program 3: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:35 executing program 4: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:35 executing program 0: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:35 executing program 4: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:35 executing program 0: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:35 executing program 4: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:35 executing program 2: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:35 executing program 5: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:36 executing program 1: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:36 executing program 3: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:36 executing program 5: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:37 executing program 5: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:37 executing program 4: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:37 executing program 0: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:37 executing program 1: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:37 executing program 3: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:37 executing program 2: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:37 executing program 5: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:37 executing program 2: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:37 executing program 3: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:38 executing program 2: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:38 executing program 3: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:38 executing program 4: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:38 executing program 1: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000600)) r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000480)) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000000)={0x100000000, 0x400, [0x7, 0x64, 0x5, 0x7fff, 0x3f], 0x2}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') 03:36:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000600)) r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000480)) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000000)={0x100000000, 0x400, [0x7, 0x64, 0x5, 0x7fff, 0x3f], 0x2}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') 03:36:38 executing program 4: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:38 executing program 1: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000600)) r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000480)) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000000)={0x100000000, 0x400, [0x7, 0x64, 0x5, 0x7fff, 0x3f], 0x2}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') 03:36:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000600)) r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000480)) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000000)={0x100000000, 0x400, [0x7, 0x64, 0x5, 0x7fff, 0x3f], 0x2}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') 03:36:39 executing program 3: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000600)) r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000480)) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000000)={0x100000000, 0x400, [0x7, 0x64, 0x5, 0x7fff, 0x3f], 0x2}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') 03:36:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000600)) r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000480)) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000000)={0x100000000, 0x400, [0x7, 0x64, 0x5, 0x7fff, 0x3f], 0x2}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') 03:36:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000600)) r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000480)) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000000)={0x100000000, 0x400, [0x7, 0x64, 0x5, 0x7fff, 0x3f], 0x2}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') 03:36:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000600)) r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000480)) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000000)={0x100000000, 0x400, [0x7, 0x64, 0x5, 0x7fff, 0x3f], 0x2}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') 03:36:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000600)) r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000480)) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000000)={0x100000000, 0x400, [0x7, 0x64, 0x5, 0x7fff, 0x3f], 0x2}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') 03:36:39 executing program 1: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000600)) r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000480)) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000000)={0x100000000, 0x400, [0x7, 0x64, 0x5, 0x7fff, 0x3f], 0x2}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') 03:36:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000600)) r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000480)) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000000)={0x100000000, 0x400, [0x7, 0x64, 0x5, 0x7fff, 0x3f], 0x2}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') 03:36:40 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001540)='/dev/btrfs-control\x00', 0x294000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname(r0, 0x0, &(0x7f00000014c0)) 03:36:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000600)) r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000480)) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000000)={0x100000000, 0x400, [0x7, 0x64, 0x5, 0x7fff, 0x3f], 0x2}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') 03:36:40 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001540)='/dev/btrfs-control\x00', 0x294000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname(r0, 0x0, &(0x7f00000014c0)) 03:36:40 executing program 3: msgget$private(0x0, 0x40a) msgget$private(0x0, 0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x58002, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000340)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='statm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0xfffffffffffffceb, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x7, 0x6, 0x3, 0x4, 0x2, 0x7, 0x453a, 0x1eb, 0x38, 0x32c, 0x1ff, 0x7, 0x20, 0x1, 0x7, 0x2, 0x1}, [{0x6474e557, 0xfffffffffffffff7, 0xfffffffffffff001, 0x100, 0x200, 0x4, 0x1}, {0x70000000, 0x101, 0x37, 0xf438, 0x200, 0x100000000, 0x3ff, 0x1}], "15e2213cf5307b7d39557ef1dc33a0a4283954df6dcba850e75816ae7a2116182245d460cdf16ad4c013f9958c313f78198a84ecaa1e479f1244bff9f4d7461eb14c78a5f107d8c443b52ffe94e9b7c106e06fa1e45b402a81571c13fb3c6bbe8afea70a897d3c10af254af0aacabc12bbdbefa1d71debe8babcb5cc2d6a0f18b4068b3785d6f6bb86be4230712899322ee2dae35f66be83440d6932e0f493e5cc6d6ed29a59be2e65575770235a937de839770d52b744157a919c4ae022bcf5fce4aa6bd91ecce8fa769ef9ca48862d4707449d6b1dd88a60693f1b7b92e5bf586bed413af1850d03e046473d3919a568387acc44fcff9e", [[], [], [], [], []]}, 0x670) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4000000020000000) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2000000000002900, {0xc000000, 0x4c00, 0x5400, 0x0, 0xf4010000}, 0x1600}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) bind$inet6(r4, &(0x7f0000000b00)={0xa, 0x4e23, 0x0, @local, 0x3}, 0x1c) unlinkat(r2, &(0x7f00000002c0)='./file0\x00', 0x200) syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xfffffffffffffffd, 0x40) 03:36:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000600)) r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000480)) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000000)={0x100000000, 0x400, [0x7, 0x64, 0x5, 0x7fff, 0x3f], 0x2}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') 03:36:40 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001540)='/dev/btrfs-control\x00', 0x294000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname(r0, 0x0, &(0x7f00000014c0)) 03:36:40 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001540)='/dev/btrfs-control\x00', 0x294000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname(r0, 0x0, &(0x7f00000014c0)) 03:36:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000600)) r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000480)) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000000)={0x100000000, 0x400, [0x7, 0x64, 0x5, 0x7fff, 0x3f], 0x2}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') 03:36:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000600)) r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000480)) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000000)={0x100000000, 0x400, [0x7, 0x64, 0x5, 0x7fff, 0x3f], 0x2}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') 03:36:40 executing program 2: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000340)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x3) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000080)={0x3, 0x0, 0x1, 0x0, 0x0, 0x9}) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0xfffffffffffffec2) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) open$dir(0x0, 0x0, 0x10) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:36:40 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001540)='/dev/btrfs-control\x00', 0x294000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname(r0, 0x0, &(0x7f00000014c0)) 03:36:40 executing program 1: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000340)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x3) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000080)={0x3, 0x0, 0x1, 0x0, 0x0, 0x9}) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0xfffffffffffffec2) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) open$dir(0x0, 0x0, 0x10) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:36:40 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001540)='/dev/btrfs-control\x00', 0x294000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname(r0, 0x0, &(0x7f00000014c0)) 03:36:41 executing program 5: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000340)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x3) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000080)={0x3, 0x0, 0x1, 0x0, 0x0, 0x9}) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0xfffffffffffffec2) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) open$dir(0x0, 0x0, 0x10) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:36:41 executing program 0: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000340)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x3) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000080)={0x3, 0x0, 0x1, 0x0, 0x0, 0x9}) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0xfffffffffffffec2) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) open$dir(0x0, 0x0, 0x10) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:36:41 executing program 1: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000340)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x3) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000080)={0x3, 0x0, 0x1, 0x0, 0x0, 0x9}) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0xfffffffffffffec2) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) open$dir(0x0, 0x0, 0x10) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:36:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 03:36:41 executing program 2: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000340)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x3) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000080)={0x3, 0x0, 0x1, 0x0, 0x0, 0x9}) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0xfffffffffffffec2) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) open$dir(0x0, 0x0, 0x10) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:36:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 03:36:41 executing program 5: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000340)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x3) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000080)={0x3, 0x0, 0x1, 0x0, 0x0, 0x9}) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0xfffffffffffffec2) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) open$dir(0x0, 0x0, 0x10) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:36:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 03:36:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 03:36:41 executing program 0: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000340)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x3) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000080)={0x3, 0x0, 0x1, 0x0, 0x0, 0x9}) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0xfffffffffffffec2) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) open$dir(0x0, 0x0, 0x10) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:36:41 executing program 2: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000340)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x3) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000080)={0x3, 0x0, 0x1, 0x0, 0x0, 0x9}) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0xfffffffffffffec2) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) open$dir(0x0, 0x0, 0x10) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:36:41 executing program 1: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000340)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x3) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000080)={0x3, 0x0, 0x1, 0x0, 0x0, 0x9}) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0xfffffffffffffec2) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) open$dir(0x0, 0x0, 0x10) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:36:41 executing program 0: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000340)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x3) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000080)={0x3, 0x0, 0x1, 0x0, 0x0, 0x9}) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0xfffffffffffffec2) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) open$dir(0x0, 0x0, 0x10) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:36:41 executing program 5: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000340)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x3) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000080)={0x3, 0x0, 0x1, 0x0, 0x0, 0x9}) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0xfffffffffffffec2) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) open$dir(0x0, 0x0, 0x10) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:36:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 03:36:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 03:36:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 03:36:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 03:36:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 03:36:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 03:36:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 03:36:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 03:36:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 03:36:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 03:36:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 03:36:42 executing program 4: r0 = socket$unix(0x1, 0x2000000000001, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = fcntl$dupfd(r2, 0x0, r3) mount$9p_fd(0x0, &(0x7f0000000340)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid={'dfltuid'}}]}}) 03:36:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 03:36:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 03:36:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 03:36:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 03:36:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 03:36:42 executing program 4: r0 = socket$unix(0x1, 0x2000000000001, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = fcntl$dupfd(r2, 0x0, r3) mount$9p_fd(0x0, &(0x7f0000000340)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid={'dfltuid'}}]}}) 03:36:42 executing program 4: r0 = socket$unix(0x1, 0x2000000000001, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = fcntl$dupfd(r2, 0x0, r3) mount$9p_fd(0x0, &(0x7f0000000340)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid={'dfltuid'}}]}}) 03:36:42 executing program 1: r0 = socket$unix(0x1, 0x2000000000001, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = fcntl$dupfd(r2, 0x0, r3) mount$9p_fd(0x0, &(0x7f0000000340)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid={'dfltuid'}}]}}) 03:36:42 executing program 2: r0 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r0, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x3, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x3a) 03:36:42 executing program 4: r0 = socket$unix(0x1, 0x2000000000001, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = fcntl$dupfd(r2, 0x0, r3) mount$9p_fd(0x0, &(0x7f0000000340)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid={'dfltuid'}}]}}) 03:36:42 executing program 5: r0 = socket$caif_seqpacket(0x25, 0x5, 0x0) setsockopt$CAIFSO_REQ_PARAM(r0, 0x116, 0x80, 0x0, 0x37c) 03:36:43 executing program 4: pause() syz_execute_func(&(0x7f0000000040)="3666440f50f564ff0941c3c4e1a5f97300660f3a8e16649c675100617b12e5c441dfd04b00c442019dccd211d46f") syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001000)="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") 03:36:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 03:36:43 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000140)=""/65, 0x272cc4e1242b68b2) 03:36:43 executing program 1: r0 = socket$unix(0x1, 0x2000000000001, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = fcntl$dupfd(r2, 0x0, r3) mount$9p_fd(0x0, &(0x7f0000000340)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid={'dfltuid'}}]}}) 03:36:43 executing program 1: r0 = socket$unix(0x1, 0x2000000000001, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = fcntl$dupfd(r2, 0x0, r3) mount$9p_fd(0x0, &(0x7f0000000340)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@dfltuid={'dfltuid'}}]}}) 03:36:43 executing program 2: r0 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r0, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x3, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x3a) 03:36:43 executing program 5: r0 = socket$caif_seqpacket(0x25, 0x5, 0x0) setsockopt$CAIFSO_REQ_PARAM(r0, 0x116, 0x80, 0x0, 0x37c) 03:36:43 executing program 2: r0 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r0, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x3, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x3a) 03:36:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0xa0000100, 0x0, 0x0, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'user:', '&', 0x20, 0xff}, 0xffffffffffffff81, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$join(0x1, 0x0) 03:36:43 executing program 2: r0 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r0, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x3, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x3a) 03:36:43 executing program 5: r0 = socket$caif_seqpacket(0x25, 0x5, 0x0) setsockopt$CAIFSO_REQ_PARAM(r0, 0x116, 0x80, 0x0, 0x37c) [ 328.005669] overlayfs: fs on 'file0' does not support file handles, falling back to index=off. [ 328.013233] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 03:36:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0xa0000100, 0x0, 0x0, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'user:', '&', 0x20, 0xff}, 0xffffffffffffff81, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$join(0x1, 0x0) [ 328.120576] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 03:36:43 executing program 4: pause() syz_execute_func(&(0x7f0000000040)="3666440f50f564ff0941c3c4e1a5f97300660f3a8e16649c675100617b12e5c441dfd04b00c442019dccd211d46f") syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001000)="c4e3f9614832074a2be93699980f053ef3aec4a37bf0c5034141e2e9e9b5c9f976c421b8c25cb100008d3581810000262fd9f96646da4e32c49499b6b9000000d50000d2dec4c442bdaec3c44299ae4000c421795184fb22910000c422558e24d50f000000470f9080008047f08fe97c810f69e08f4cbec5c4c2858c3f2d56c4613f3ac21d9090c7ab86c4213ea51313000043d9497d410fa9a642857e00c3a0eaa0ea3a603d06f0ff00c4e06d7d9371d4d2d4d205ba16f2aed9fdf045832d950000002cf5964eaaaaadeab41339c366460f383139620842090981fa706b00f9ef0008c481b1f39f0d000000c401513644bf4100b150400f381da900e001f0428155fdd2cb0000c6d591340fededff66dee440dcfb3646d39bce00000091047b8f49580197feffff7f4080a009210000df3b7d0f12e400f4260fe88c4200000000a8c4e190410add6166430f3a0d1754451f337b6b000066450f3823dec423b50dba0900000000430fc4c17829f6c463ad0b5890ca6c0f84500000006466420f3a0b0100c4217ddc9a08000000660fedc2238fe978cce16a85529e6d6d8175759d8f00664581e000000000f2d8fb47f6d0f0f0839200000080a79cffffc3bd7c6d8300af77cb44cb44e42ec4a17c10020f1541220606c441f4542bdaa8feefffff81380010c4026726670f010e0f7e548807c40155f64506ecc462519f8efeefffff7b0a49fcfc82e2816262f3440f897f1717972ec1048e5c0b5c0b5c670f0d5b0064450fe242d9c481635ad89c70d3813811bc111752484e0740e9e941fc9d1b1b0fadd5818a2b233233fdffff7f45ee880c009f008fc97881b500000000") 03:36:43 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000140)=""/65, 0x272cc4e1242b68b2) 03:36:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0xa0000100, 0x0, 0x0, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'user:', '&', 0x20, 0xff}, 0xffffffffffffff81, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$join(0x1, 0x0) 03:36:43 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000140)=""/65, 0x272cc4e1242b68b2) 03:36:43 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000140)=""/65, 0x272cc4e1242b68b2) 03:36:43 executing program 5: r0 = socket$caif_seqpacket(0x25, 0x5, 0x0) setsockopt$CAIFSO_REQ_PARAM(r0, 0x116, 0x80, 0x0, 0x37c) 03:36:43 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000140)=""/65, 0x272cc4e1242b68b2) 03:36:44 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000140)=""/65, 0x272cc4e1242b68b2) 03:36:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0xa0000100, 0x0, 0x0, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'user:', '&', 0x20, 0xff}, 0xffffffffffffff81, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$join(0x1, 0x0) 03:36:44 executing program 5: pause() syz_execute_func(&(0x7f0000000040)="3666440f50f564ff0941c3c4e1a5f97300660f3a8e16649c675100617b12e5c441dfd04b00c442019dccd211d46f") syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001000)="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") [ 328.635797] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 03:36:44 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000140)=""/65, 0x272cc4e1242b68b2) 03:36:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0xa0000100, 0x0, 0x0, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'user:', '&', 0x20, 0xff}, 0xffffffffffffff81, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$join(0x1, 0x0) [ 328.736266] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 328.816506] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 03:36:44 executing program 4: pause() syz_execute_func(&(0x7f0000000040)="3666440f50f564ff0941c3c4e1a5f97300660f3a8e16649c675100617b12e5c441dfd04b00c442019dccd211d46f") syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001000)="c4e3f9614832074a2be93699980f053ef3aec4a37bf0c5034141e2e9e9b5c9f976c421b8c25cb100008d3581810000262fd9f96646da4e32c49499b6b9000000d50000d2dec4c442bdaec3c44299ae4000c421795184fb22910000c422558e24d50f000000470f9080008047f08fe97c810f69e08f4cbec5c4c2858c3f2d56c4613f3ac21d9090c7ab86c4213ea51313000043d9497d410fa9a642857e00c3a0eaa0ea3a603d06f0ff00c4e06d7d9371d4d2d4d205ba16f2aed9fdf045832d950000002cf5964eaaaaadeab41339c366460f383139620842090981fa706b00f9ef0008c481b1f39f0d000000c401513644bf4100b150400f381da900e001f0428155fdd2cb0000c6d591340fededff66dee440dcfb3646d39bce00000091047b8f49580197feffff7f4080a009210000df3b7d0f12e400f4260fe88c4200000000a8c4e190410add6166430f3a0d1754451f337b6b000066450f3823dec423b50dba0900000000430fc4c17829f6c463ad0b5890ca6c0f84500000006466420f3a0b0100c4217ddc9a08000000660fedc2238fe978cce16a85529e6d6d8175759d8f00664581e000000000f2d8fb47f6d0f0f0839200000080a79cffffc3bd7c6d8300af77cb44cb44e42ec4a17c10020f1541220606c441f4542bdaa8feefffff81380010c4026726670f010e0f7e548807c40155f64506ecc462519f8efeefffff7b0a49fcfc82e2816262f3440f897f1717972ec1048e5c0b5c0b5c670f0d5b0064450fe242d9c481635ad89c70d3813811bc111752484e0740e9e941fc9d1b1b0fadd5818a2b233233fdffff7f45ee880c009f008fc97881b500000000") 03:36:44 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000140)=""/65, 0x272cc4e1242b68b2) 03:36:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0xa0000100, 0x0, 0x0, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'user:', '&', 0x20, 0xff}, 0xffffffffffffff81, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$join(0x1, 0x0) 03:36:44 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000140)=""/65, 0x272cc4e1242b68b2) 03:36:44 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000140)=""/65, 0x272cc4e1242b68b2) 03:36:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0xa0000100, 0x0, 0x0, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'user:', '&', 0x20, 0xff}, 0xffffffffffffff81, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$join(0x1, 0x0) 03:36:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0xa0000100, 0x0, 0x0, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'user:', '&', 0x20, 0xff}, 0xffffffffffffff81, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$join(0x1, 0x0) [ 329.508763] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 03:36:44 executing program 5: pause() syz_execute_func(&(0x7f0000000040)="3666440f50f564ff0941c3c4e1a5f97300660f3a8e16649c675100617b12e5c441dfd04b00c442019dccd211d46f") syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001000)="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") 03:36:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0xa0000100, 0x0, 0x0, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'user:', '&', 0x20, 0xff}, 0xffffffffffffff81, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$join(0x1, 0x0) 03:36:44 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x1, 0x0) read$FUSE(r0, &(0x7f0000000240), 0x1000) [ 329.622048] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 03:36:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0xa0000100, 0x0, 0x0, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'user:', '&', 0x20, 0xff}, 0xffffffffffffff81, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$join(0x1, 0x0) 03:36:45 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x11) [ 329.672984] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 329.693290] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 329.757397] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 03:36:45 executing program 4: pause() syz_execute_func(&(0x7f0000000040)="3666440f50f564ff0941c3c4e1a5f97300660f3a8e16649c675100617b12e5c441dfd04b00c442019dccd211d46f") syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001000)="c4e3f9614832074a2be93699980f053ef3aec4a37bf0c5034141e2e9e9b5c9f976c421b8c25cb100008d3581810000262fd9f96646da4e32c49499b6b9000000d50000d2dec4c442bdaec3c44299ae4000c421795184fb22910000c422558e24d50f000000470f9080008047f08fe97c810f69e08f4cbec5c4c2858c3f2d56c4613f3ac21d9090c7ab86c4213ea51313000043d9497d410fa9a642857e00c3a0eaa0ea3a603d06f0ff00c4e06d7d9371d4d2d4d205ba16f2aed9fdf045832d950000002cf5964eaaaaadeab41339c366460f383139620842090981fa706b00f9ef0008c481b1f39f0d000000c401513644bf4100b150400f381da900e001f0428155fdd2cb0000c6d591340fededff66dee440dcfb3646d39bce00000091047b8f49580197feffff7f4080a009210000df3b7d0f12e400f4260fe88c4200000000a8c4e190410add6166430f3a0d1754451f337b6b000066450f3823dec423b50dba0900000000430fc4c17829f6c463ad0b5890ca6c0f84500000006466420f3a0b0100c4217ddc9a08000000660fedc2238fe978cce16a85529e6d6d8175759d8f00664581e000000000f2d8fb47f6d0f0f0839200000080a79cffffc3bd7c6d8300af77cb44cb44e42ec4a17c10020f1541220606c441f4542bdaa8feefffff81380010c4026726670f010e0f7e548807c40155f64506ecc462519f8efeefffff7b0a49fcfc82e2816262f3440f897f1717972ec1048e5c0b5c0b5c670f0d5b0064450fe242d9c481635ad89c70d3813811bc111752484e0740e9e941fc9d1b1b0fadd5818a2b233233fdffff7f45ee880c009f008fc97881b500000000") 03:36:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0xa0000100, 0x0, 0x0, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'user:', '&', 0x20, 0xff}, 0xffffffffffffff81, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$join(0x1, 0x0) 03:36:45 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x11) 03:36:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0xa0000100, 0x0, 0x0, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'user:', '&', 0x20, 0xff}, 0xffffffffffffff81, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$join(0x1, 0x0) 03:36:45 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x1, 0x0) read$FUSE(r0, &(0x7f0000000240), 0x1000) 03:36:45 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x1, 0x0) read$FUSE(r0, &(0x7f0000000240), 0x1000) 03:36:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0xa0000100, 0x0, 0x0, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'user:', '&', 0x20, 0xff}, 0xffffffffffffff81, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$join(0x1, 0x0) [ 330.352157] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 330.371761] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 03:36:45 executing program 5: pause() syz_execute_func(&(0x7f0000000040)="3666440f50f564ff0941c3c4e1a5f97300660f3a8e16649c675100617b12e5c441dfd04b00c442019dccd211d46f") syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001000)="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") 03:36:45 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x11) 03:36:45 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x11) 03:36:45 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x11) [ 330.458317] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 03:36:45 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x11) 03:36:46 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x1, 0x0) read$FUSE(r0, &(0x7f0000000240), 0x1000) 03:36:46 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x11) 03:36:46 executing program 1: mlockall(0x1) clone(0xc80000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x402200, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000180)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x0, 0x0) bind$bt_sco(r1, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x20000080000, 0x0) mlockall(0x1) 03:36:46 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x1, 0x0) read$FUSE(r0, &(0x7f0000000240), 0x1000) 03:36:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$unix(0x1, 0x5, 0x0) close(r0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) close(r2) close(r1) pipe(&(0x7f0000000000)) splice(r0, 0x0, r2, 0x0, 0x6d5d, 0x0) 03:36:46 executing program 2: openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x36b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@empty}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x51) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/sockstat\x00') 03:36:46 executing program 5: r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f00000003c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,G\x87\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3_8\xab\x9f-h\x12\xe2\xf4km\xfes\xe0\xea4Nb]\xe5}\xc9\xb2\xd5K\\f&\xc05\xd07\x14\x9b\x99\xf7\x81^\x9e\xee', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 03:36:46 executing program 5: r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f00000003c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,G\x87\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3_8\xab\x9f-h\x12\xe2\xf4km\xfes\xe0\xea4Nb]\xe5}\xc9\xb2\xd5K\\f&\xc05\xd07\x14\x9b\x99\xf7\x81^\x9e\xee', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 03:36:46 executing program 5: r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f00000003c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,G\x87\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3_8\xab\x9f-h\x12\xe2\xf4km\xfes\xe0\xea4Nb]\xe5}\xc9\xb2\xd5K\\f&\xc05\xd07\x14\x9b\x99\xf7\x81^\x9e\xee', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 03:36:46 executing program 5: r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f00000003c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,G\x87\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3_8\xab\x9f-h\x12\xe2\xf4km\xfes\xe0\xea4Nb]\xe5}\xc9\xb2\xd5K\\f&\xc05\xd07\x14\x9b\x99\xf7\x81^\x9e\xee', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 03:36:46 executing program 2: openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x36b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@empty}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x51) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/sockstat\x00') 03:36:46 executing program 5: openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x36b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@empty}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x51) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/sockstat\x00') 03:36:47 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x1, 0x0) read$FUSE(r0, &(0x7f0000000240), 0x1000) 03:36:47 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x1, 0x0) read$FUSE(r0, &(0x7f0000000240), 0x1000) 03:36:47 executing program 1: mlockall(0x1) clone(0xc80000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x402200, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000180)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x0, 0x0) bind$bt_sco(r1, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x20000080000, 0x0) mlockall(0x1) 03:36:47 executing program 2: openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x36b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@empty}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x51) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/sockstat\x00') 03:36:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$unix(0x1, 0x5, 0x0) close(r0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) close(r2) close(r1) pipe(&(0x7f0000000000)) splice(r0, 0x0, r2, 0x0, 0x6d5d, 0x0) 03:36:49 executing program 5: openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x36b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@empty}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x51) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/sockstat\x00') 03:36:49 executing program 2: openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x36b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@empty}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x51) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/sockstat\x00') 03:36:49 executing program 3: mlockall(0x1) clone(0xc80000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x402200, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000180)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x0, 0x0) bind$bt_sco(r1, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x20000080000, 0x0) mlockall(0x1) 03:36:49 executing program 0: mlockall(0x1) clone(0xc80000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x402200, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000180)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x0, 0x0) bind$bt_sco(r1, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x20000080000, 0x0) mlockall(0x1) 03:36:49 executing program 1: mlockall(0x1) clone(0xc80000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x402200, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000180)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x0, 0x0) bind$bt_sco(r1, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x20000080000, 0x0) mlockall(0x1) 03:36:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$unix(0x1, 0x5, 0x0) close(r0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) close(r2) close(r1) pipe(&(0x7f0000000000)) splice(r0, 0x0, r2, 0x0, 0x6d5d, 0x0) 03:36:50 executing program 5: openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x36b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@empty}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x51) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/sockstat\x00') 03:36:50 executing program 0: mlockall(0x1) clone(0xc80000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x402200, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000180)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x0, 0x0) bind$bt_sco(r1, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x20000080000, 0x0) mlockall(0x1) 03:36:50 executing program 3: mlockall(0x1) clone(0xc80000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x402200, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000180)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x0, 0x0) bind$bt_sco(r1, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x20000080000, 0x0) mlockall(0x1) 03:36:50 executing program 1: mlockall(0x1) clone(0xc80000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x402200, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000180)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x0, 0x0) bind$bt_sco(r1, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x20000080000, 0x0) mlockall(0x1) 03:36:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$unix(0x1, 0x5, 0x0) close(r0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) close(r2) close(r1) pipe(&(0x7f0000000000)) splice(r0, 0x0, r2, 0x0, 0x6d5d, 0x0) 03:36:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$unix(0x1, 0x5, 0x0) close(r0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) close(r2) close(r1) pipe(&(0x7f0000000000)) splice(r0, 0x0, r2, 0x0, 0x6d5d, 0x0) 03:36:52 executing program 0: mlockall(0x1) clone(0xc80000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x402200, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000180)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x0, 0x0) bind$bt_sco(r1, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x20000080000, 0x0) mlockall(0x1) 03:36:52 executing program 3: mlockall(0x1) clone(0xc80000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x402200, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000180)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x0, 0x0) bind$bt_sco(r1, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x20000080000, 0x0) mlockall(0x1) 03:36:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$unix(0x1, 0x5, 0x0) close(r0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) close(r2) close(r1) pipe(&(0x7f0000000000)) splice(r0, 0x0, r2, 0x0, 0x6d5d, 0x0) 03:36:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$unix(0x1, 0x5, 0x0) close(r0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) close(r2) close(r1) pipe(&(0x7f0000000000)) splice(r0, 0x0, r2, 0x0, 0x6d5d, 0x0) 03:36:53 executing program 0: mlockall(0x1) clone(0xc80000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x402200, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000180)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x0, 0x0) bind$bt_sco(r1, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x20000080000, 0x0) mlockall(0x1) 03:36:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$unix(0x1, 0x5, 0x0) close(r0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) close(r2) close(r1) pipe(&(0x7f0000000000)) splice(r0, 0x0, r2, 0x0, 0x6d5d, 0x0) 03:36:53 executing program 0: mlockall(0x1) clone(0xc80000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x402200, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000180)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x0, 0x0) bind$bt_sco(r1, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x20000080000, 0x0) mlockall(0x1) 03:36:53 executing program 0: mlockall(0x1) clone(0xc80000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x402200, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000180)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x0, 0x0) bind$bt_sco(r1, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x20000080000, 0x0) mlockall(0x1) 03:36:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$unix(0x1, 0x5, 0x0) close(r0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) close(r2) close(r1) pipe(&(0x7f0000000000)) splice(r0, 0x0, r2, 0x0, 0x6d5d, 0x0) 03:36:54 executing program 0: mlockall(0x1) clone(0xc80000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x402200, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000180)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x0, 0x0) bind$bt_sco(r1, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x20000080000, 0x0) mlockall(0x1) 03:36:54 executing program 0: mlockall(0x1) clone(0xc80000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x402200, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000180)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x0, 0x0) bind$bt_sco(r1, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x20000080000, 0x0) mlockall(0x1) 03:36:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$unix(0x1, 0x5, 0x0) close(r0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) close(r2) close(r1) pipe(&(0x7f0000000000)) splice(r0, 0x0, r2, 0x0, 0x6d5d, 0x0) 03:36:55 executing program 0: mlockall(0x1) clone(0xc80000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x402200, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000180)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x0, 0x0) bind$bt_sco(r1, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x20000080000, 0x0) mlockall(0x1) 03:36:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$unix(0x1, 0x5, 0x0) close(r0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) close(r2) close(r1) pipe(&(0x7f0000000000)) splice(r0, 0x0, r2, 0x0, 0x6d5d, 0x0) 03:36:55 executing program 0: openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x36b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@empty}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x51) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/sockstat\x00') 03:36:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$unix(0x1, 0x5, 0x0) close(r0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) close(r2) close(r1) pipe(&(0x7f0000000000)) splice(r0, 0x0, r2, 0x0, 0x6d5d, 0x0) 03:36:56 executing program 0: openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x36b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@empty}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x51) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/sockstat\x00') 03:36:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$unix(0x1, 0x5, 0x0) close(r0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) close(r2) close(r1) pipe(&(0x7f0000000000)) splice(r0, 0x0, r2, 0x0, 0x6d5d, 0x0) 03:36:56 executing program 0: openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x36b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@empty}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x51) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/sockstat\x00') 03:36:56 executing program 0: openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x36b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@empty}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x51) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/sockstat\x00') 03:36:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$unix(0x1, 0x5, 0x0) close(r0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) close(r2) close(r1) pipe(&(0x7f0000000000)) splice(r0, 0x0, r2, 0x0, 0x6d5d, 0x0) 03:36:56 executing program 0: openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x36b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@empty}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x51) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/sockstat\x00') 03:36:57 executing program 0: openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x36b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@empty}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x51) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/sockstat\x00') 03:36:58 executing program 0: openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x36b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@empty}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x51) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/sockstat\x00') 03:36:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$unix(0x1, 0x5, 0x0) close(r0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) close(r2) close(r1) pipe(&(0x7f0000000000)) splice(r0, 0x0, r2, 0x0, 0x6d5d, 0x0) 03:36:58 executing program 4: openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x36b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@empty}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x51) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/sockstat\x00') 03:36:58 executing program 4: openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x36b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@empty}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x51) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/sockstat\x00') 03:36:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$unix(0x1, 0x5, 0x0) close(r0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) close(r2) close(r1) pipe(&(0x7f0000000000)) splice(r0, 0x0, r2, 0x0, 0x6d5d, 0x0) 03:36:59 executing program 0: openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x36b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@empty}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x51) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/sockstat\x00') 03:36:59 executing program 0: openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x36b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@empty}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x51) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/sockstat\x00') 03:36:59 executing program 4: openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x36b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@empty}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x51) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/sockstat\x00') 03:36:59 executing program 2: openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x36b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@empty}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x51) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/sockstat\x00') 03:36:59 executing program 2: openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x36b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@empty}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x51) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/sockstat\x00') 03:36:59 executing program 4: r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f00000003c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,G\x87\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3_8\xab\x9f-h\x12\xe2\xf4km\xfes\xe0\xea4Nb]\xe5}\xc9\xb2\xd5K\\f&\xc05\xd07\x14\x9b\x99\xf7\x81^\x9e\xee', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 03:36:59 executing program 0: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001740)) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f00000000c0), 0x21f) bind$inet6(r0, &(0x7f0000d1a000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) shutdown(r0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x4000) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20040000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x3, 0x200000) r2 = syz_open_dev$swradio(&(0x7f0000000300)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet6_buf(r2, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f00000002c0)=0x28) r3 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xa8, 0x10000) accept$unix(r3, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0xffffffffffffffea) write$P9_RWALK(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="160000006f010001000c0000000002000000000000009f8f460744eaceff007869360873d41b5a583b5da7eb7faefe2af1895db99cca04c056121996eedd3c90c570cd89be76ddfc761fb23623d3c454dafeab071071134df173dbc600000000d5000005"], 0x64) 03:36:59 executing program 5: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x97d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) close(r0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) [ 345.510245] IPVS: ftp: loaded support on port[0] = 21 03:37:01 executing program 2: openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x36b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0x5b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000100)={@empty}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f0000000140), 0x391, 0x51) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/sockstat\x00') 03:37:01 executing program 0: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001740)) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f00000000c0), 0x21f) bind$inet6(r0, &(0x7f0000d1a000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) shutdown(r0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x4000) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20040000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x3, 0x200000) r2 = syz_open_dev$swradio(&(0x7f0000000300)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet6_buf(r2, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f00000002c0)=0x28) r3 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xa8, 0x10000) accept$unix(r3, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0xffffffffffffffea) write$P9_RWALK(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="160000006f010001000c0000000002000000000000009f8f460744eaceff007869360873d41b5a583b5da7eb7faefe2af1895db99cca04c056121996eedd3c90c570cd89be76ddfc761fb23623d3c454dafeab071071134df173dbc600000000d5000005"], 0x64) 03:37:01 executing program 5: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x97d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) close(r0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) 03:37:02 executing program 2: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001740)) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f00000000c0), 0x21f) bind$inet6(r0, &(0x7f0000d1a000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) shutdown(r0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x4000) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20040000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x3, 0x200000) r2 = syz_open_dev$swradio(&(0x7f0000000300)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet6_buf(r2, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f00000002c0)=0x28) r3 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xa8, 0x10000) accept$unix(r3, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0xffffffffffffffea) write$P9_RWALK(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="160000006f010001000c0000000002000000000000009f8f460744eaceff007869360873d41b5a583b5da7eb7faefe2af1895db99cca04c056121996eedd3c90c570cd89be76ddfc761fb23623d3c454dafeab071071134df173dbc600000000d5000005"], 0x64) 03:37:02 executing program 1: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001740)) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f00000000c0), 0x21f) bind$inet6(r0, &(0x7f0000d1a000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) shutdown(r0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x4000) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20040000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x3, 0x200000) r2 = syz_open_dev$swradio(&(0x7f0000000300)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet6_buf(r2, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f00000002c0)=0x28) r3 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xa8, 0x10000) accept$unix(r3, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0xffffffffffffffea) write$P9_RWALK(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="160000006f010001000c0000000002000000000000009f8f460744eaceff007869360873d41b5a583b5da7eb7faefe2af1895db99cca04c056121996eedd3c90c570cd89be76ddfc761fb23623d3c454dafeab071071134df173dbc600000000d5000005"], 0x64) 03:37:02 executing program 4: r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f00000003c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,G\x87\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3_8\xab\x9f-h\x12\xe2\xf4km\xfes\xe0\xea4Nb]\xe5}\xc9\xb2\xd5K\\f&\xc05\xd07\x14\x9b\x99\xf7\x81^\x9e\xee', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 03:37:02 executing program 5: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x97d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) close(r0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) 03:37:02 executing program 3: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001740)) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f00000000c0), 0x21f) bind$inet6(r0, &(0x7f0000d1a000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) shutdown(r0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x4000) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20040000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x3, 0x200000) r2 = syz_open_dev$swradio(&(0x7f0000000300)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet6_buf(r2, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f00000002c0)=0x28) r3 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xa8, 0x10000) accept$unix(r3, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0xffffffffffffffea) write$P9_RWALK(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="160000006f010001000c0000000002000000000000009f8f460744eaceff007869360873d41b5a583b5da7eb7faefe2af1895db99cca04c056121996eedd3c90c570cd89be76ddfc761fb23623d3c454dafeab071071134df173dbc600000000d5000005"], 0x64) 03:37:02 executing program 4: r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f00000003c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,G\x87\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3_8\xab\x9f-h\x12\xe2\xf4km\xfes\xe0\xea4Nb]\xe5}\xc9\xb2\xd5K\\f&\xc05\xd07\x14\x9b\x99\xf7\x81^\x9e\xee', &(0x7f0000000100)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 03:37:02 executing program 4: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001740)) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f00000000c0), 0x21f) bind$inet6(r0, &(0x7f0000d1a000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) shutdown(r0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x4000) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20040000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x3, 0x200000) r2 = syz_open_dev$swradio(&(0x7f0000000300)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet6_buf(r2, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f00000002c0)=0x28) r3 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xa8, 0x10000) accept$unix(r3, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0xffffffffffffffea) write$P9_RWALK(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="160000006f010001000c0000000002000000000000009f8f460744eaceff007869360873d41b5a583b5da7eb7faefe2af1895db99cca04c056121996eedd3c90c570cd89be76ddfc761fb23623d3c454dafeab071071134df173dbc600000000d5000005"], 0x64) 03:37:02 executing program 5: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x97d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) close(r0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) 03:37:02 executing program 5: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001740)) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f00000000c0), 0x21f) bind$inet6(r0, &(0x7f0000d1a000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) shutdown(r0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x4000) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20040000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x3, 0x200000) r2 = syz_open_dev$swradio(&(0x7f0000000300)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet6_buf(r2, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f00000002c0)=0x28) r3 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xa8, 0x10000) accept$unix(r3, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0xffffffffffffffea) write$P9_RWALK(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="160000006f010001000c0000000002000000000000009f8f460744eaceff007869360873d41b5a583b5da7eb7faefe2af1895db99cca04c056121996eedd3c90c570cd89be76ddfc761fb23623d3c454dafeab071071134df173dbc600000000d5000005"], 0x64) 03:37:02 executing program 0: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001740)) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f00000000c0), 0x21f) bind$inet6(r0, &(0x7f0000d1a000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) shutdown(r0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x4000) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20040000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x3, 0x200000) r2 = syz_open_dev$swradio(&(0x7f0000000300)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet6_buf(r2, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f00000002c0)=0x28) r3 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xa8, 0x10000) accept$unix(r3, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0xffffffffffffffea) write$P9_RWALK(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="160000006f010001000c0000000002000000000000009f8f460744eaceff007869360873d41b5a583b5da7eb7faefe2af1895db99cca04c056121996eedd3c90c570cd89be76ddfc761fb23623d3c454dafeab071071134df173dbc600000000d5000005"], 0x64) 03:37:02 executing program 2: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001740)) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f00000000c0), 0x21f) bind$inet6(r0, &(0x7f0000d1a000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) shutdown(r0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x4000) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20040000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x3, 0x200000) r2 = syz_open_dev$swradio(&(0x7f0000000300)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet6_buf(r2, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f00000002c0)=0x28) r3 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xa8, 0x10000) accept$unix(r3, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0xffffffffffffffea) write$P9_RWALK(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="160000006f010001000c0000000002000000000000009f8f460744eaceff007869360873d41b5a583b5da7eb7faefe2af1895db99cca04c056121996eedd3c90c570cd89be76ddfc761fb23623d3c454dafeab071071134df173dbc600000000d5000005"], 0x64) 03:37:03 executing program 1: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001740)) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f00000000c0), 0x21f) bind$inet6(r0, &(0x7f0000d1a000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) shutdown(r0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x4000) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20040000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x3, 0x200000) r2 = syz_open_dev$swradio(&(0x7f0000000300)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet6_buf(r2, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f00000002c0)=0x28) r3 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xa8, 0x10000) accept$unix(r3, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0xffffffffffffffea) write$P9_RWALK(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="160000006f010001000c0000000002000000000000009f8f460744eaceff007869360873d41b5a583b5da7eb7faefe2af1895db99cca04c056121996eedd3c90c570cd89be76ddfc761fb23623d3c454dafeab071071134df173dbc600000000d5000005"], 0x64) 03:37:03 executing program 3: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001740)) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f00000000c0), 0x21f) bind$inet6(r0, &(0x7f0000d1a000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) shutdown(r0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x4000) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20040000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x3, 0x200000) r2 = syz_open_dev$swradio(&(0x7f0000000300)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet6_buf(r2, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f00000002c0)=0x28) r3 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xa8, 0x10000) accept$unix(r3, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0xffffffffffffffea) write$P9_RWALK(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="160000006f010001000c0000000002000000000000009f8f460744eaceff007869360873d41b5a583b5da7eb7faefe2af1895db99cca04c056121996eedd3c90c570cd89be76ddfc761fb23623d3c454dafeab071071134df173dbc600000000d5000005"], 0x64) 03:37:03 executing program 4: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001740)) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f00000000c0), 0x21f) bind$inet6(r0, &(0x7f0000d1a000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) shutdown(r0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x4000) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20040000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x3, 0x200000) r2 = syz_open_dev$swradio(&(0x7f0000000300)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet6_buf(r2, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f00000002c0)=0x28) r3 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xa8, 0x10000) accept$unix(r3, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0xffffffffffffffea) write$P9_RWALK(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="160000006f010001000c0000000002000000000000009f8f460744eaceff007869360873d41b5a583b5da7eb7faefe2af1895db99cca04c056121996eedd3c90c570cd89be76ddfc761fb23623d3c454dafeab071071134df173dbc600000000d5000005"], 0x64) 03:37:03 executing program 5: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001740)) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f00000000c0), 0x21f) bind$inet6(r0, &(0x7f0000d1a000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) shutdown(r0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x4000) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20040000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x3, 0x200000) r2 = syz_open_dev$swradio(&(0x7f0000000300)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet6_buf(r2, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f00000002c0)=0x28) r3 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xa8, 0x10000) accept$unix(r3, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0xffffffffffffffea) write$P9_RWALK(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="160000006f010001000c0000000002000000000000009f8f460744eaceff007869360873d41b5a583b5da7eb7faefe2af1895db99cca04c056121996eedd3c90c570cd89be76ddfc761fb23623d3c454dafeab071071134df173dbc600000000d5000005"], 0x64) 03:37:03 executing program 2: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001740)) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f00000000c0), 0x21f) bind$inet6(r0, &(0x7f0000d1a000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) shutdown(r0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x4000) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20040000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x3, 0x200000) r2 = syz_open_dev$swradio(&(0x7f0000000300)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet6_buf(r2, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f00000002c0)=0x28) r3 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xa8, 0x10000) accept$unix(r3, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0xffffffffffffffea) write$P9_RWALK(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="160000006f010001000c0000000002000000000000009f8f460744eaceff007869360873d41b5a583b5da7eb7faefe2af1895db99cca04c056121996eedd3c90c570cd89be76ddfc761fb23623d3c454dafeab071071134df173dbc600000000d5000005"], 0x64) 03:37:03 executing program 1: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001740)) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f00000000c0), 0x21f) bind$inet6(r0, &(0x7f0000d1a000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) shutdown(r0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x4000) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20040000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x3, 0x200000) r2 = syz_open_dev$swradio(&(0x7f0000000300)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet6_buf(r2, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f00000002c0)=0x28) r3 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xa8, 0x10000) accept$unix(r3, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0xffffffffffffffea) write$P9_RWALK(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="160000006f010001000c0000000002000000000000009f8f460744eaceff007869360873d41b5a583b5da7eb7faefe2af1895db99cca04c056121996eedd3c90c570cd89be76ddfc761fb23623d3c454dafeab071071134df173dbc600000000d5000005"], 0x64) 03:37:03 executing program 3: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001740)) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f00000000c0), 0x21f) bind$inet6(r0, &(0x7f0000d1a000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) shutdown(r0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x4000) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20040000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x3, 0x200000) r2 = syz_open_dev$swradio(&(0x7f0000000300)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet6_buf(r2, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f00000002c0)=0x28) r3 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xa8, 0x10000) accept$unix(r3, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0xffffffffffffffea) write$P9_RWALK(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="160000006f010001000c0000000002000000000000009f8f460744eaceff007869360873d41b5a583b5da7eb7faefe2af1895db99cca04c056121996eedd3c90c570cd89be76ddfc761fb23623d3c454dafeab071071134df173dbc600000000d5000005"], 0x64) 03:37:03 executing program 4: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001740)) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f00000000c0), 0x21f) bind$inet6(r0, &(0x7f0000d1a000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) shutdown(r0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x4000) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20040000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x3, 0x200000) r2 = syz_open_dev$swradio(&(0x7f0000000300)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet6_buf(r2, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f00000002c0)=0x28) r3 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xa8, 0x10000) accept$unix(r3, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0xffffffffffffffea) write$P9_RWALK(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="160000006f010001000c0000000002000000000000009f8f460744eaceff007869360873d41b5a583b5da7eb7faefe2af1895db99cca04c056121996eedd3c90c570cd89be76ddfc761fb23623d3c454dafeab071071134df173dbc600000000d5000005"], 0x64) 03:37:03 executing program 5: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001740)) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f00000000c0), 0x21f) bind$inet6(r0, &(0x7f0000d1a000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) shutdown(r0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x4000) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20040000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x3, 0x200000) r2 = syz_open_dev$swradio(&(0x7f0000000300)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet6_buf(r2, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f00000002c0)=0x28) r3 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xa8, 0x10000) accept$unix(r3, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0xffffffffffffffea) write$P9_RWALK(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="160000006f010001000c0000000002000000000000009f8f460744eaceff007869360873d41b5a583b5da7eb7faefe2af1895db99cca04c056121996eedd3c90c570cd89be76ddfc761fb23623d3c454dafeab071071134df173dbc600000000d5000005"], 0x64) [ 348.730187] IPVS: ftp: loaded support on port[0] = 21 03:37:04 executing program 0: getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001740)) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f00000000c0), 0x21f) bind$inet6(r0, &(0x7f0000d1a000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) shutdown(r0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x4000) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f0000000040)=0x8, 0x4) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20040000, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x3, 0x200000) r2 = syz_open_dev$swradio(&(0x7f0000000300)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet6_buf(r2, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f00000002c0)=0x28) r3 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xa8, 0x10000) accept$unix(r3, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0xffffffffffffffea) write$P9_RWALK(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="160000006f010001000c0000000002000000000000009f8f460744eaceff007869360873d41b5a583b5da7eb7faefe2af1895db99cca04c056121996eedd3c90c570cd89be76ddfc761fb23623d3c454dafeab071071134df173dbc600000000d5000005"], 0x64) 03:37:04 executing program 3: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x97d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) close(r0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) 03:37:04 executing program 1: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x97d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) close(r0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) 03:37:04 executing program 4: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x97d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) close(r0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) 03:37:04 executing program 3: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x97d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) close(r0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) 03:37:04 executing program 1: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x97d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) close(r0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) 03:37:04 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) setsockopt$rose(r0, 0x104, 0x0, 0x0, 0x27b) [ 349.780222] IPVS: ftp: loaded support on port[0] = 21 03:37:05 executing program 4: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x97d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) close(r0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) 03:37:05 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) setsockopt$rose(r0, 0x104, 0x0, 0x0, 0x27b) 03:37:05 executing program 3: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x97d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) close(r0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) 03:37:05 executing program 1: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x97d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) close(r0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) 03:37:05 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000f85fa0)={0x2, 0x4, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}]}, 0x60}}, 0x0) 03:37:05 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) setsockopt$rose(r0, 0x104, 0x0, 0x0, 0x27b) 03:37:05 executing program 4: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x97d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) close(r0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) 03:37:05 executing program 1: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) getdents(r0, 0x0, 0x11a) 03:37:05 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cdf0311cfc093a52a7d86bd10c9d68573b94531dc9cca9a4cd8c33cc", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000004400)=[{{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000004280)=""/223, 0xdf}], 0x1}}], 0x1, 0x0, 0x0) 03:37:05 executing program 3: clone(0x802102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x21) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0xdf72, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:37:05 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) setsockopt$rose(r0, 0x104, 0x0, 0x0, 0x27b) 03:37:05 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000f85fa0)={0x2, 0x4, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}]}, 0x60}}, 0x0) 03:37:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000200)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[], 0x271) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/84, 0x54}, {&(0x7f0000000340)=""/249, 0xf9}], 0x2}}], 0x1, 0x0, 0x0) 03:37:05 executing program 1: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) getdents(r0, 0x0, 0x11a) 03:37:05 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cdf0311cfc093a52a7d86bd10c9d68573b94531dc9cca9a4cd8c33cc", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000004400)=[{{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000004280)=""/223, 0xdf}], 0x1}}], 0x1, 0x0, 0x0) 03:37:05 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000f85fa0)={0x2, 0x4, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}]}, 0x60}}, 0x0) 03:37:05 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cdf0311cfc093a52a7d86bd10c9d68573b94531dc9cca9a4cd8c33cc", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000004400)=[{{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000004280)=""/223, 0xdf}], 0x1}}], 0x1, 0x0, 0x0) 03:37:05 executing program 1: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) getdents(r0, 0x0, 0x11a) 03:37:05 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cdf0311cfc093a52a7d86bd10c9d68573b94531dc9cca9a4cd8c33cc", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000004400)=[{{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000004280)=""/223, 0xdf}], 0x1}}], 0x1, 0x0, 0x0) 03:37:05 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cdf0311cfc093a52a7d86bd10c9d68573b94531dc9cca9a4cd8c33cc", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000004400)=[{{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000004280)=""/223, 0xdf}], 0x1}}], 0x1, 0x0, 0x0) 03:37:05 executing program 1: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) getdents(r0, 0x0, 0x11a) 03:37:08 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cdf0311cfc093a52a7d86bd10c9d68573b94531dc9cca9a4cd8c33cc", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000004400)=[{{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000004280)=""/223, 0xdf}], 0x1}}], 0x1, 0x0, 0x0) 03:37:08 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000f85fa0)={0x2, 0x4, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}]}, 0x60}}, 0x0) 03:37:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000200)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[], 0x271) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/84, 0x54}, {&(0x7f0000000340)=""/249, 0xf9}], 0x2}}], 0x1, 0x0, 0x0) 03:37:08 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cdf0311cfc093a52a7d86bd10c9d68573b94531dc9cca9a4cd8c33cc", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000004400)=[{{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000004280)=""/223, 0xdf}], 0x1}}], 0x1, 0x0, 0x0) 03:37:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000200)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[], 0x271) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/84, 0x54}, {&(0x7f0000000340)=""/249, 0xf9}], 0x2}}], 0x1, 0x0, 0x0) 03:37:08 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cdf0311cfc093a52a7d86bd10c9d68573b94531dc9cca9a4cd8c33cc", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000004400)=[{{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000004280)=""/223, 0xdf}], 0x1}}], 0x1, 0x0, 0x0) 03:37:08 executing program 2: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) getdents(r0, 0x0, 0x11a) 03:37:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000200)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[], 0x271) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/84, 0x54}, {&(0x7f0000000340)=""/249, 0xf9}], 0x2}}], 0x1, 0x0, 0x0) 03:37:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000200)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[], 0x271) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/84, 0x54}, {&(0x7f0000000340)=""/249, 0xf9}], 0x2}}], 0x1, 0x0, 0x0) 03:37:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x20000400, 0x0, 0x0, 0x20000620, 0x20000650], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'erspan0\x00', 'ip6_vti0\x00', 'ros\x02\x00', 'bridge_slave_1\x00', @random="1f14d2acee56", [], @dev, [], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}]}, 0x1b0) 03:37:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000200)="0adc1f123c123f319bc070") syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001240)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}, {@errors_remount='errors=remount-ro'}]}) 03:37:08 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cdf0311cfc093a52a7d86bd10c9d68573b94531dc9cca9a4cd8c33cc", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000004400)=[{{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000004280)=""/223, 0xdf}], 0x1}}], 0x1, 0x0, 0x0) 03:37:08 executing program 2: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) getdents(r0, 0x0, 0x11a) 03:37:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000200)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[], 0x271) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/84, 0x54}, {&(0x7f0000000340)=""/249, 0xf9}], 0x2}}], 0x1, 0x0, 0x0) 03:37:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000200)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[], 0x271) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/84, 0x54}, {&(0x7f0000000340)=""/249, 0xf9}], 0x2}}], 0x1, 0x0, 0x0) 03:37:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x20000400, 0x0, 0x0, 0x20000620, 0x20000650], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'erspan0\x00', 'ip6_vti0\x00', 'ros\x02\x00', 'bridge_slave_1\x00', @random="1f14d2acee56", [], @dev, [], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}]}, 0x1b0) 03:37:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000200)="0adc1f123c123f319bc070") syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001240)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}, {@errors_remount='errors=remount-ro'}]}) 03:37:08 executing program 2: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) getdents(r0, 0x0, 0x11a) 03:37:08 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cdf0311cfc093a52a7d86bd10c9d68573b94531dc9cca9a4cd8c33cc", 0x20) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000004400)=[{{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000004280)=""/223, 0xdf}], 0x1}}], 0x1, 0x0, 0x0) 03:37:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x20000400, 0x0, 0x0, 0x20000620, 0x20000650], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'erspan0\x00', 'ip6_vti0\x00', 'ros\x02\x00', 'bridge_slave_1\x00', @random="1f14d2acee56", [], @dev, [], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}]}, 0x1b0) 03:37:08 executing program 1: syz_execute_func(&(0x7f0000001280)="0fbecc91cd80d3d369ef69dc00d9d0d0c44139fd5bf930c7c7e4c653fbc461f85a6136ace468f4a95ff9c44149f2168f4808eebce00000802000c421fc51c1ea01ef8f8920010e4545186746c4c10211cf26660fe98d0d000000c4e2e591a4fa0200000026ca400f0d18a018a0fe5ff6e3df646736676666430fefb3000000000804f4f30f1a12e250500f7c29") 03:37:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000200)="0adc1f123c123f319bc070") syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001240)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}, {@errors_remount='errors=remount-ro'}]}) 03:37:09 executing program 4: syz_open_dev$binder(&(0x7f00000008c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000100)={0x4, 0x0, &(0x7f0000000000)=[@enter_looper], 0x1, 0x500000000000000, &(0x7f0000000b80)='\x00'}) 03:37:09 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x90c, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x380000, @loopback}, 0x1c) sendmmsg$alg(r0, &(0x7f0000002500)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=[@assoc={0x18, 0x29, 0xb}], 0x18}], 0x3, 0x0) 03:37:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x6, 0x7, 0x0, 0x3}}) 03:37:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x2, 0x138, [0x20000400, 0x0, 0x0, 0x20000620, 0x20000650], 0x0, 0x0, &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'erspan0\x00', 'ip6_vti0\x00', 'ros\x02\x00', 'bridge_slave_1\x00', @random="1f14d2acee56", [], @dev, [], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}]}, 0x1b0) [ 353.756138] audit: type=1400 audit(2000000229.076:132): avc: denied { map } for pid=19425 comm="syz-executor.4" path="/dev/binder0" dev="devtmpfs" ino=14693 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 03:37:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000200)="0adc1f123c123f319bc070") syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001240)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}, {@errors_remount='errors=remount-ro'}]}) 03:37:09 executing program 1: syz_execute_func(&(0x7f0000001280)="0fbecc91cd80d3d369ef69dc00d9d0d0c44139fd5bf930c7c7e4c653fbc461f85a6136ace468f4a95ff9c44149f2168f4808eebce00000802000c421fc51c1ea01ef8f8920010e4545186746c4c10211cf26660fe98d0d000000c4e2e591a4fa0200000026ca400f0d18a018a0fe5ff6e3df646736676666430fefb3000000000804f4f30f1a12e250500f7c29") 03:37:09 executing program 5: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000280)={0xffffffffffffff9c}) r0 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x6, 0x20000) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000040)={0xfffffffffffffff7, "9ab64d7cd71177bccc03e97f0b7a2542819e49f85112e6505c34d5aae485804a", 0x3, 0x1}) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) ioctl$VIDIOC_S_OUTPUT(0xffffffffffffffff, 0xc004562f, &(0x7f0000000340)=0x2674) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = semget$private(0x0, 0x2, 0x0) semctl$IPC_INFO(r3, 0x4, 0x3, &(0x7f0000000200)=""/81) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) unshare(0x40000000) getsockopt$inet6_buf(r1, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) r4 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x0, 0x10000) accept$unix(r4, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f00000000c0)={0x0, 0x10000, 0x6, 0x2, 0xd}) sendmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000400)="1d367a56f5c42c3c55049d2090b3b67c6217944c321b2fb7a7279ff6002d771186d421f3e6fb1470d0416a6bf2d44f85002dac12c4669df60ef5216e6dfdc5ee8bdbaf6ae7c0996d7a329b7bc3889ef618feb869b3e7aea117d9f4f3c15ab7ede488bb51", 0x64}], 0x1}, 0x4) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f00000001c0)) 03:37:09 executing program 1: syz_execute_func(&(0x7f0000001280)="0fbecc91cd80d3d369ef69dc00d9d0d0c44139fd5bf930c7c7e4c653fbc461f85a6136ace468f4a95ff9c44149f2168f4808eebce00000802000c421fc51c1ea01ef8f8920010e4545186746c4c10211cf26660fe98d0d000000c4e2e591a4fa0200000026ca400f0d18a018a0fe5ff6e3df646736676666430fefb3000000000804f4f30f1a12e250500f7c29") [ 353.845489] audit: type=1400 audit(2000000229.136:133): avc: denied { set_context_mgr } for pid=19425 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 03:37:09 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x90c, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x380000, @loopback}, 0x1c) sendmmsg$alg(r0, &(0x7f0000002500)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=[@assoc={0x18, 0x29, 0xb}], 0x18}], 0x3, 0x0) 03:37:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x6, 0x7, 0x0, 0x3}}) 03:37:09 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x90c, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x380000, @loopback}, 0x1c) sendmmsg$alg(r0, &(0x7f0000002500)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=[@assoc={0x18, 0x29, 0xb}], 0x18}], 0x3, 0x0) 03:37:09 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x90c, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x380000, @loopback}, 0x1c) sendmmsg$alg(r0, &(0x7f0000002500)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=[@assoc={0x18, 0x29, 0xb}], 0x18}], 0x3, 0x0) 03:37:09 executing program 4: syz_open_dev$binder(&(0x7f00000008c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000100)={0x4, 0x0, &(0x7f0000000000)=[@enter_looper], 0x1, 0x500000000000000, &(0x7f0000000b80)='\x00'}) 03:37:09 executing program 1: syz_execute_func(&(0x7f0000001280)="0fbecc91cd80d3d369ef69dc00d9d0d0c44139fd5bf930c7c7e4c653fbc461f85a6136ace468f4a95ff9c44149f2168f4808eebce00000802000c421fc51c1ea01ef8f8920010e4545186746c4c10211cf26660fe98d0d000000c4e2e591a4fa0200000026ca400f0d18a018a0fe5ff6e3df646736676666430fefb3000000000804f4f30f1a12e250500f7c29") 03:37:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x6, 0x7, 0x0, 0x3}}) 03:37:09 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x90c, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x380000, @loopback}, 0x1c) sendmmsg$alg(r0, &(0x7f0000002500)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=[@assoc={0x18, 0x29, 0xb}], 0x18}], 0x3, 0x0) 03:37:09 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x90c, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x380000, @loopback}, 0x1c) sendmmsg$alg(r0, &(0x7f0000002500)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=[@assoc={0x18, 0x29, 0xb}], 0x18}], 0x3, 0x0) 03:37:09 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x90c, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x380000, @loopback}, 0x1c) sendmmsg$alg(r0, &(0x7f0000002500)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=[@assoc={0x18, 0x29, 0xb}], 0x18}], 0x3, 0x0) [ 354.701129] IPVS: ftp: loaded support on port[0] = 21 03:37:10 executing program 5: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000280)={0xffffffffffffff9c}) r0 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x6, 0x20000) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000040)={0xfffffffffffffff7, "9ab64d7cd71177bccc03e97f0b7a2542819e49f85112e6505c34d5aae485804a", 0x3, 0x1}) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) ioctl$VIDIOC_S_OUTPUT(0xffffffffffffffff, 0xc004562f, &(0x7f0000000340)=0x2674) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = semget$private(0x0, 0x2, 0x0) semctl$IPC_INFO(r3, 0x4, 0x3, &(0x7f0000000200)=""/81) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) unshare(0x40000000) getsockopt$inet6_buf(r1, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) r4 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x0, 0x10000) accept$unix(r4, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f00000000c0)={0x0, 0x10000, 0x6, 0x2, 0xd}) sendmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000400)="1d367a56f5c42c3c55049d2090b3b67c6217944c321b2fb7a7279ff6002d771186d421f3e6fb1470d0416a6bf2d44f85002dac12c4669df60ef5216e6dfdc5ee8bdbaf6ae7c0996d7a329b7bc3889ef618feb869b3e7aea117d9f4f3c15ab7ede488bb51", 0x64}], 0x1}, 0x4) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f00000001c0)) 03:37:10 executing program 2: syz_open_dev$binder(&(0x7f00000008c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000100)={0x4, 0x0, &(0x7f0000000000)=[@enter_looper], 0x1, 0x500000000000000, &(0x7f0000000b80)='\x00'}) 03:37:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x6, 0x7, 0x0, 0x3}}) 03:37:10 executing program 1: syz_open_dev$binder(&(0x7f00000008c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000100)={0x4, 0x0, &(0x7f0000000000)=[@enter_looper], 0x1, 0x500000000000000, &(0x7f0000000b80)='\x00'}) 03:37:10 executing program 0: syz_open_dev$binder(&(0x7f00000008c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000100)={0x4, 0x0, &(0x7f0000000000)=[@enter_looper], 0x1, 0x500000000000000, &(0x7f0000000b80)='\x00'}) [ 355.004734] binder: BINDER_SET_CONTEXT_MGR already set [ 355.011871] binder: 19491:19496 ioctl 40046207 0 returned -16 [ 355.025691] binder: BINDER_SET_CONTEXT_MGR already set [ 355.031881] binder: 19493:19498 ioctl 40046207 0 returned -16 [ 355.047853] binder: BINDER_SET_CONTEXT_MGR already set 03:37:10 executing program 3: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000280)={0xffffffffffffff9c}) r0 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x6, 0x20000) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000040)={0xfffffffffffffff7, "9ab64d7cd71177bccc03e97f0b7a2542819e49f85112e6505c34d5aae485804a", 0x3, 0x1}) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) ioctl$VIDIOC_S_OUTPUT(0xffffffffffffffff, 0xc004562f, &(0x7f0000000340)=0x2674) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = semget$private(0x0, 0x2, 0x0) semctl$IPC_INFO(r3, 0x4, 0x3, &(0x7f0000000200)=""/81) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) unshare(0x40000000) getsockopt$inet6_buf(r1, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) r4 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x0, 0x10000) accept$unix(r4, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f00000000c0)={0x0, 0x10000, 0x6, 0x2, 0xd}) sendmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000400)="1d367a56f5c42c3c55049d2090b3b67c6217944c321b2fb7a7279ff6002d771186d421f3e6fb1470d0416a6bf2d44f85002dac12c4669df60ef5216e6dfdc5ee8bdbaf6ae7c0996d7a329b7bc3889ef618feb869b3e7aea117d9f4f3c15ab7ede488bb51", 0x64}], 0x1}, 0x4) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f00000001c0)) [ 355.053628] binder: 19494:19499 ioctl 40046207 0 returned -16 03:37:10 executing program 4: syz_open_dev$binder(&(0x7f00000008c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000100)={0x4, 0x0, &(0x7f0000000000)=[@enter_looper], 0x1, 0x500000000000000, &(0x7f0000000b80)='\x00'}) 03:37:11 executing program 2: syz_open_dev$binder(&(0x7f00000008c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000100)={0x4, 0x0, &(0x7f0000000000)=[@enter_looper], 0x1, 0x500000000000000, &(0x7f0000000b80)='\x00'}) 03:37:11 executing program 5: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000280)={0xffffffffffffff9c}) r0 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x6, 0x20000) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000040)={0xfffffffffffffff7, "9ab64d7cd71177bccc03e97f0b7a2542819e49f85112e6505c34d5aae485804a", 0x3, 0x1}) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) ioctl$VIDIOC_S_OUTPUT(0xffffffffffffffff, 0xc004562f, &(0x7f0000000340)=0x2674) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = semget$private(0x0, 0x2, 0x0) semctl$IPC_INFO(r3, 0x4, 0x3, &(0x7f0000000200)=""/81) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) unshare(0x40000000) getsockopt$inet6_buf(r1, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) r4 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x0, 0x10000) accept$unix(r4, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f00000000c0)={0x0, 0x10000, 0x6, 0x2, 0xd}) sendmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000400)="1d367a56f5c42c3c55049d2090b3b67c6217944c321b2fb7a7279ff6002d771186d421f3e6fb1470d0416a6bf2d44f85002dac12c4669df60ef5216e6dfdc5ee8bdbaf6ae7c0996d7a329b7bc3889ef618feb869b3e7aea117d9f4f3c15ab7ede488bb51", 0x64}], 0x1}, 0x4) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f00000001c0)) 03:37:11 executing program 1: syz_open_dev$binder(&(0x7f00000008c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000100)={0x4, 0x0, &(0x7f0000000000)=[@enter_looper], 0x1, 0x500000000000000, &(0x7f0000000b80)='\x00'}) 03:37:11 executing program 3: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000280)={0xffffffffffffff9c}) r0 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x6, 0x20000) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000040)={0xfffffffffffffff7, "9ab64d7cd71177bccc03e97f0b7a2542819e49f85112e6505c34d5aae485804a", 0x3, 0x1}) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) ioctl$VIDIOC_S_OUTPUT(0xffffffffffffffff, 0xc004562f, &(0x7f0000000340)=0x2674) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = semget$private(0x0, 0x2, 0x0) semctl$IPC_INFO(r3, 0x4, 0x3, &(0x7f0000000200)=""/81) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) unshare(0x40000000) getsockopt$inet6_buf(r1, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) r4 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x0, 0x10000) accept$unix(r4, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f00000000c0)={0x0, 0x10000, 0x6, 0x2, 0xd}) sendmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000400)="1d367a56f5c42c3c55049d2090b3b67c6217944c321b2fb7a7279ff6002d771186d421f3e6fb1470d0416a6bf2d44f85002dac12c4669df60ef5216e6dfdc5ee8bdbaf6ae7c0996d7a329b7bc3889ef618feb869b3e7aea117d9f4f3c15ab7ede488bb51", 0x64}], 0x1}, 0x4) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f00000001c0)) 03:37:11 executing program 0: syz_open_dev$binder(&(0x7f00000008c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000100)={0x4, 0x0, &(0x7f0000000000)=[@enter_looper], 0x1, 0x500000000000000, &(0x7f0000000b80)='\x00'}) [ 355.890624] binder: BINDER_SET_CONTEXT_MGR already set [ 355.936404] binder: 19510:19513 ioctl 40046207 0 returned -16 [ 355.946945] binder: BINDER_SET_CONTEXT_MGR already set [ 355.966852] binder: 19514:19520 ioctl 40046207 0 returned -16 03:37:11 executing program 2: syz_open_dev$binder(&(0x7f00000008c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000100)={0x4, 0x0, &(0x7f0000000000)=[@enter_looper], 0x1, 0x500000000000000, &(0x7f0000000b80)='\x00'}) [ 355.998279] binder: BINDER_SET_CONTEXT_MGR already set [ 356.004382] binder: 19519:19524 ioctl 40046207 0 returned -16 [ 356.047775] binder: BINDER_SET_CONTEXT_MGR already set [ 356.053597] binder: 19527:19529 ioctl 40046207 0 returned -16 03:37:11 executing program 4: syz_open_dev$binder(&(0x7f00000008c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000100)={0x4, 0x0, &(0x7f0000000000)=[@enter_looper], 0x1, 0x500000000000000, &(0x7f0000000b80)='\x00'}) 03:37:12 executing program 5: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000280)={0xffffffffffffff9c}) r0 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x6, 0x20000) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000040)={0xfffffffffffffff7, "9ab64d7cd71177bccc03e97f0b7a2542819e49f85112e6505c34d5aae485804a", 0x3, 0x1}) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) ioctl$VIDIOC_S_OUTPUT(0xffffffffffffffff, 0xc004562f, &(0x7f0000000340)=0x2674) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = semget$private(0x0, 0x2, 0x0) semctl$IPC_INFO(r3, 0x4, 0x3, &(0x7f0000000200)=""/81) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) unshare(0x40000000) getsockopt$inet6_buf(r1, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) r4 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x0, 0x10000) accept$unix(r4, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f00000000c0)={0x0, 0x10000, 0x6, 0x2, 0xd}) sendmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000400)="1d367a56f5c42c3c55049d2090b3b67c6217944c321b2fb7a7279ff6002d771186d421f3e6fb1470d0416a6bf2d44f85002dac12c4669df60ef5216e6dfdc5ee8bdbaf6ae7c0996d7a329b7bc3889ef618feb869b3e7aea117d9f4f3c15ab7ede488bb51", 0x64}], 0x1}, 0x4) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f00000001c0)) 03:37:12 executing program 3: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000280)={0xffffffffffffff9c}) r0 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x6, 0x20000) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000040)={0xfffffffffffffff7, "9ab64d7cd71177bccc03e97f0b7a2542819e49f85112e6505c34d5aae485804a", 0x3, 0x1}) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) ioctl$VIDIOC_S_OUTPUT(0xffffffffffffffff, 0xc004562f, &(0x7f0000000340)=0x2674) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = semget$private(0x0, 0x2, 0x0) semctl$IPC_INFO(r3, 0x4, 0x3, &(0x7f0000000200)=""/81) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) unshare(0x40000000) getsockopt$inet6_buf(r1, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) r4 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x0, 0x10000) accept$unix(r4, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f00000000c0)={0x0, 0x10000, 0x6, 0x2, 0xd}) sendmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000400)="1d367a56f5c42c3c55049d2090b3b67c6217944c321b2fb7a7279ff6002d771186d421f3e6fb1470d0416a6bf2d44f85002dac12c4669df60ef5216e6dfdc5ee8bdbaf6ae7c0996d7a329b7bc3889ef618feb869b3e7aea117d9f4f3c15ab7ede488bb51", 0x64}], 0x1}, 0x4) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f00000001c0)) 03:37:12 executing program 1: syz_open_dev$binder(&(0x7f00000008c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000100)={0x4, 0x0, &(0x7f0000000000)=[@enter_looper], 0x1, 0x500000000000000, &(0x7f0000000b80)='\x00'}) 03:37:12 executing program 0: syz_open_dev$binder(&(0x7f00000008c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000100)={0x4, 0x0, &(0x7f0000000000)=[@enter_looper], 0x1, 0x500000000000000, &(0x7f0000000b80)='\x00'}) 03:37:12 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000280)={0xffffffffffffff9c}) r0 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x6, 0x20000) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000040)={0xfffffffffffffff7, "9ab64d7cd71177bccc03e97f0b7a2542819e49f85112e6505c34d5aae485804a", 0x3, 0x1}) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) ioctl$VIDIOC_S_OUTPUT(0xffffffffffffffff, 0xc004562f, &(0x7f0000000340)=0x2674) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = semget$private(0x0, 0x2, 0x0) semctl$IPC_INFO(r3, 0x4, 0x3, &(0x7f0000000200)=""/81) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) unshare(0x40000000) getsockopt$inet6_buf(r1, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) r4 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x0, 0x10000) accept$unix(r4, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f00000000c0)={0x0, 0x10000, 0x6, 0x2, 0xd}) sendmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000400)="1d367a56f5c42c3c55049d2090b3b67c6217944c321b2fb7a7279ff6002d771186d421f3e6fb1470d0416a6bf2d44f85002dac12c4669df60ef5216e6dfdc5ee8bdbaf6ae7c0996d7a329b7bc3889ef618feb869b3e7aea117d9f4f3c15ab7ede488bb51", 0x64}], 0x1}, 0x4) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f00000001c0)) [ 356.843890] binder: BINDER_SET_CONTEXT_MGR already set [ 356.849584] binder: 19539:19542 ioctl 40046207 0 returned -16 [ 356.878158] binder: BINDER_SET_CONTEXT_MGR already set [ 356.883930] binder: 19541:19545 ioctl 40046207 0 returned -16 03:37:12 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000280)={0xffffffffffffff9c}) r0 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x6, 0x20000) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000040)={0xfffffffffffffff7, "9ab64d7cd71177bccc03e97f0b7a2542819e49f85112e6505c34d5aae485804a", 0x3, 0x1}) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) ioctl$VIDIOC_S_OUTPUT(0xffffffffffffffff, 0xc004562f, &(0x7f0000000340)=0x2674) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = semget$private(0x0, 0x2, 0x0) semctl$IPC_INFO(r3, 0x4, 0x3, &(0x7f0000000200)=""/81) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) unshare(0x40000000) getsockopt$inet6_buf(r1, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) r4 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x0, 0x10000) accept$unix(r4, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f00000000c0)={0x0, 0x10000, 0x6, 0x2, 0xd}) sendmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000400)="1d367a56f5c42c3c55049d2090b3b67c6217944c321b2fb7a7279ff6002d771186d421f3e6fb1470d0416a6bf2d44f85002dac12c4669df60ef5216e6dfdc5ee8bdbaf6ae7c0996d7a329b7bc3889ef618feb869b3e7aea117d9f4f3c15ab7ede488bb51", 0x64}], 0x1}, 0x4) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f00000001c0)) 03:37:12 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000280)={0xffffffffffffff9c}) r0 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x6, 0x20000) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000040)={0xfffffffffffffff7, "9ab64d7cd71177bccc03e97f0b7a2542819e49f85112e6505c34d5aae485804a", 0x3, 0x1}) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) ioctl$VIDIOC_S_OUTPUT(0xffffffffffffffff, 0xc004562f, &(0x7f0000000340)=0x2674) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = semget$private(0x0, 0x2, 0x0) semctl$IPC_INFO(r3, 0x4, 0x3, &(0x7f0000000200)=""/81) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) unshare(0x40000000) getsockopt$inet6_buf(r1, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) r4 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x0, 0x10000) accept$unix(r4, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f00000000c0)={0x0, 0x10000, 0x6, 0x2, 0xd}) sendmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000400)="1d367a56f5c42c3c55049d2090b3b67c6217944c321b2fb7a7279ff6002d771186d421f3e6fb1470d0416a6bf2d44f85002dac12c4669df60ef5216e6dfdc5ee8bdbaf6ae7c0996d7a329b7bc3889ef618feb869b3e7aea117d9f4f3c15ab7ede488bb51", 0x64}], 0x1}, 0x4) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f00000001c0)) 03:37:13 executing program 5: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000280)={0xffffffffffffff9c}) r0 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x6, 0x20000) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000040)={0xfffffffffffffff7, "9ab64d7cd71177bccc03e97f0b7a2542819e49f85112e6505c34d5aae485804a", 0x3, 0x1}) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) ioctl$VIDIOC_S_OUTPUT(0xffffffffffffffff, 0xc004562f, &(0x7f0000000340)=0x2674) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = semget$private(0x0, 0x2, 0x0) semctl$IPC_INFO(r3, 0x4, 0x3, &(0x7f0000000200)=""/81) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) unshare(0x40000000) getsockopt$inet6_buf(r1, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) r4 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x0, 0x10000) accept$unix(r4, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f00000000c0)={0x0, 0x10000, 0x6, 0x2, 0xd}) sendmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000400)="1d367a56f5c42c3c55049d2090b3b67c6217944c321b2fb7a7279ff6002d771186d421f3e6fb1470d0416a6bf2d44f85002dac12c4669df60ef5216e6dfdc5ee8bdbaf6ae7c0996d7a329b7bc3889ef618feb869b3e7aea117d9f4f3c15ab7ede488bb51", 0x64}], 0x1}, 0x4) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f00000001c0)) 03:37:13 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x90c, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x380000, @loopback}, 0x1c) sendmmsg$alg(r0, &(0x7f0000002500)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=[@assoc={0x18, 0x29, 0xb}], 0x18}], 0x3, 0x0) 03:37:13 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000280)={0xffffffffffffff9c}) r0 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x6, 0x20000) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000040)={0xfffffffffffffff7, "9ab64d7cd71177bccc03e97f0b7a2542819e49f85112e6505c34d5aae485804a", 0x3, 0x1}) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) ioctl$VIDIOC_S_OUTPUT(0xffffffffffffffff, 0xc004562f, &(0x7f0000000340)=0x2674) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = semget$private(0x0, 0x2, 0x0) semctl$IPC_INFO(r3, 0x4, 0x3, &(0x7f0000000200)=""/81) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) unshare(0x40000000) getsockopt$inet6_buf(r1, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) r4 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x0, 0x10000) accept$unix(r4, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f00000000c0)={0x0, 0x10000, 0x6, 0x2, 0xd}) sendmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000400)="1d367a56f5c42c3c55049d2090b3b67c6217944c321b2fb7a7279ff6002d771186d421f3e6fb1470d0416a6bf2d44f85002dac12c4669df60ef5216e6dfdc5ee8bdbaf6ae7c0996d7a329b7bc3889ef618feb869b3e7aea117d9f4f3c15ab7ede488bb51", 0x64}], 0x1}, 0x4) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f00000001c0)) 03:37:13 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x90c, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x380000, @loopback}, 0x1c) sendmmsg$alg(r0, &(0x7f0000002500)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=[@assoc={0x18, 0x29, 0xb}], 0x18}], 0x3, 0x0) 03:37:13 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x90c, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x380000, @loopback}, 0x1c) sendmmsg$alg(r0, &(0x7f0000002500)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=[@assoc={0x18, 0x29, 0xb}], 0x18}], 0x3, 0x0) 03:37:13 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x90c, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x380000, @loopback}, 0x1c) sendmmsg$alg(r0, &(0x7f0000002500)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=[@assoc={0x18, 0x29, 0xb}], 0x18}], 0x3, 0x0) [ 357.890412] IPVS: ftp: loaded support on port[0] = 21 03:37:13 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000280)={0xffffffffffffff9c}) r0 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x6, 0x20000) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000040)={0xfffffffffffffff7, "9ab64d7cd71177bccc03e97f0b7a2542819e49f85112e6505c34d5aae485804a", 0x3, 0x1}) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) ioctl$VIDIOC_S_OUTPUT(0xffffffffffffffff, 0xc004562f, &(0x7f0000000340)=0x2674) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = semget$private(0x0, 0x2, 0x0) semctl$IPC_INFO(r3, 0x4, 0x3, &(0x7f0000000200)=""/81) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) unshare(0x40000000) getsockopt$inet6_buf(r1, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) r4 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x0, 0x10000) accept$unix(r4, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f00000000c0)={0x0, 0x10000, 0x6, 0x2, 0xd}) sendmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000400)="1d367a56f5c42c3c55049d2090b3b67c6217944c321b2fb7a7279ff6002d771186d421f3e6fb1470d0416a6bf2d44f85002dac12c4669df60ef5216e6dfdc5ee8bdbaf6ae7c0996d7a329b7bc3889ef618feb869b3e7aea117d9f4f3c15ab7ede488bb51", 0x64}], 0x1}, 0x4) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f00000001c0)) 03:37:13 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x90c, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x380000, @loopback}, 0x1c) sendmmsg$alg(r0, &(0x7f0000002500)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=[@assoc={0x18, 0x29, 0xb}], 0x18}], 0x3, 0x0) 03:37:13 executing program 3: r0 = socket(0x10, 0x1000040000000003, 0x0) write(r0, &(0x7f00000000c0)="22000000140007058d000009004c030402080313010000000800020041080ae376ab", 0x22) 03:37:13 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x90c, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x380000, @loopback}, 0x1c) sendmmsg$alg(r0, &(0x7f0000002500)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=[@assoc={0x18, 0x29, 0xb}], 0x18}], 0x3, 0x0) 03:37:13 executing program 3: r0 = socket(0x10, 0x1000040000000003, 0x0) write(r0, &(0x7f00000000c0)="22000000140007058d000009004c030402080313010000000800020041080ae376ab", 0x22) [ 358.226748] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.3'. [ 358.279085] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.3'. 03:37:13 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000280)={0xffffffffffffff9c}) r0 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x6, 0x20000) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000040)={0xfffffffffffffff7, "9ab64d7cd71177bccc03e97f0b7a2542819e49f85112e6505c34d5aae485804a", 0x3, 0x1}) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) ioctl$VIDIOC_S_OUTPUT(0xffffffffffffffff, 0xc004562f, &(0x7f0000000340)=0x2674) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = semget$private(0x0, 0x2, 0x0) semctl$IPC_INFO(r3, 0x4, 0x3, &(0x7f0000000200)=""/81) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) unshare(0x40000000) getsockopt$inet6_buf(r1, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) r4 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x0, 0x10000) accept$unix(r4, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f00000000c0)={0x0, 0x10000, 0x6, 0x2, 0xd}) sendmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000400)="1d367a56f5c42c3c55049d2090b3b67c6217944c321b2fb7a7279ff6002d771186d421f3e6fb1470d0416a6bf2d44f85002dac12c4669df60ef5216e6dfdc5ee8bdbaf6ae7c0996d7a329b7bc3889ef618feb869b3e7aea117d9f4f3c15ab7ede488bb51", 0x64}], 0x1}, 0x4) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f00000001c0)) [ 358.490647] IPVS: ftp: loaded support on port[0] = 21 03:37:14 executing program 5: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000280)={0xffffffffffffff9c}) r0 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x6, 0x20000) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000040)={0xfffffffffffffff7, "9ab64d7cd71177bccc03e97f0b7a2542819e49f85112e6505c34d5aae485804a", 0x3, 0x1}) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) ioctl$VIDIOC_S_OUTPUT(0xffffffffffffffff, 0xc004562f, &(0x7f0000000340)=0x2674) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = semget$private(0x0, 0x2, 0x0) semctl$IPC_INFO(r3, 0x4, 0x3, &(0x7f0000000200)=""/81) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) unshare(0x40000000) getsockopt$inet6_buf(r1, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) r4 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x0, 0x10000) accept$unix(r4, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f00000000c0)={0x0, 0x10000, 0x6, 0x2, 0xd}) sendmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000400)="1d367a56f5c42c3c55049d2090b3b67c6217944c321b2fb7a7279ff6002d771186d421f3e6fb1470d0416a6bf2d44f85002dac12c4669df60ef5216e6dfdc5ee8bdbaf6ae7c0996d7a329b7bc3889ef618feb869b3e7aea117d9f4f3c15ab7ede488bb51", 0x64}], 0x1}, 0x4) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f00000001c0)) 03:37:14 executing program 0: r0 = socket$inet(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000240)="4c0000001200ff095ffefd956fa283b724a6002200000000000000683540150024001d001fc41180b598bc593ab6821148a710de33a49868c62b2ca654a6613b6aabf35d0f81000000000000", 0x4c}], 0x1}, 0x0) 03:37:14 executing program 3: r0 = socket(0x10, 0x1000040000000003, 0x0) write(r0, &(0x7f00000000c0)="22000000140007058d000009004c030402080313010000000800020041080ae376ab", 0x22) 03:37:14 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000280)={0xffffffffffffff9c}) r0 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x6, 0x20000) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000040)={0xfffffffffffffff7, "9ab64d7cd71177bccc03e97f0b7a2542819e49f85112e6505c34d5aae485804a", 0x3, 0x1}) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) ioctl$VIDIOC_S_OUTPUT(0xffffffffffffffff, 0xc004562f, &(0x7f0000000340)=0x2674) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = semget$private(0x0, 0x2, 0x0) semctl$IPC_INFO(r3, 0x4, 0x3, &(0x7f0000000200)=""/81) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) unshare(0x40000000) getsockopt$inet6_buf(r1, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) r4 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x0, 0x10000) accept$unix(r4, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f00000000c0)={0x0, 0x10000, 0x6, 0x2, 0xd}) sendmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000400)="1d367a56f5c42c3c55049d2090b3b67c6217944c321b2fb7a7279ff6002d771186d421f3e6fb1470d0416a6bf2d44f85002dac12c4669df60ef5216e6dfdc5ee8bdbaf6ae7c0996d7a329b7bc3889ef618feb869b3e7aea117d9f4f3c15ab7ede488bb51", 0x64}], 0x1}, 0x4) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f00000001c0)) 03:37:14 executing program 3: r0 = socket(0x10, 0x1000040000000003, 0x0) write(r0, &(0x7f00000000c0)="22000000140007058d000009004c030402080313010000000800020041080ae376ab", 0x22) [ 358.867411] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.3'. 03:37:14 executing program 0: r0 = socket$inet(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000240)="4c0000001200ff095ffefd956fa283b724a6002200000000000000683540150024001d001fc41180b598bc593ab6821148a710de33a49868c62b2ca654a6613b6aabf35d0f81000000000000", 0x4c}], 0x1}, 0x0) [ 358.929916] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.3'. 03:37:14 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000280)={0xffffffffffffff9c}) r0 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x6, 0x20000) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000040)={0xfffffffffffffff7, "9ab64d7cd71177bccc03e97f0b7a2542819e49f85112e6505c34d5aae485804a", 0x3, 0x1}) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) ioctl$VIDIOC_S_OUTPUT(0xffffffffffffffff, 0xc004562f, &(0x7f0000000340)=0x2674) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = semget$private(0x0, 0x2, 0x0) semctl$IPC_INFO(r3, 0x4, 0x3, &(0x7f0000000200)=""/81) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) unshare(0x40000000) getsockopt$inet6_buf(r1, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) r4 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x0, 0x10000) accept$unix(r4, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f00000000c0)={0x0, 0x10000, 0x6, 0x2, 0xd}) sendmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000400)="1d367a56f5c42c3c55049d2090b3b67c6217944c321b2fb7a7279ff6002d771186d421f3e6fb1470d0416a6bf2d44f85002dac12c4669df60ef5216e6dfdc5ee8bdbaf6ae7c0996d7a329b7bc3889ef618feb869b3e7aea117d9f4f3c15ab7ede488bb51", 0x64}], 0x1}, 0x4) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f00000001c0)) 03:37:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndmidi(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000040)={0x10, 0xf0ffffff00000f00}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x48, 0x14, 0x207, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}, [@nested={0x0, 0x0, [@typed={0x300, 0x0, @fd}]}]}, 0x24c}}, 0x0) 03:37:14 executing program 0: r0 = socket$inet(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000240)="4c0000001200ff095ffefd956fa283b724a6002200000000000000683540150024001d001fc41180b598bc593ab6821148a710de33a49868c62b2ca654a6613b6aabf35d0f81000000000000", 0x4c}], 0x1}, 0x0) 03:37:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndmidi(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000040)={0x10, 0xf0ffffff00000f00}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x48, 0x14, 0x207, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}, [@nested={0x0, 0x0, [@typed={0x300, 0x0, @fd}]}]}, 0x24c}}, 0x0) 03:37:14 executing program 0: r0 = socket$inet(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000240)="4c0000001200ff095ffefd956fa283b724a6002200000000000000683540150024001d001fc41180b598bc593ab6821148a710de33a49868c62b2ca654a6613b6aabf35d0f81000000000000", 0x4c}], 0x1}, 0x0) 03:37:14 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000280)={0xffffffffffffff9c}) r0 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x6, 0x20000) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000040)={0xfffffffffffffff7, "9ab64d7cd71177bccc03e97f0b7a2542819e49f85112e6505c34d5aae485804a", 0x3, 0x1}) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) ioctl$VIDIOC_S_OUTPUT(0xffffffffffffffff, 0xc004562f, &(0x7f0000000340)=0x2674) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = semget$private(0x0, 0x2, 0x0) semctl$IPC_INFO(r3, 0x4, 0x3, &(0x7f0000000200)=""/81) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) unshare(0x40000000) getsockopt$inet6_buf(r1, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) r4 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x0, 0x10000) accept$unix(r4, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f00000000c0)={0x0, 0x10000, 0x6, 0x2, 0xd}) sendmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000400)="1d367a56f5c42c3c55049d2090b3b67c6217944c321b2fb7a7279ff6002d771186d421f3e6fb1470d0416a6bf2d44f85002dac12c4669df60ef5216e6dfdc5ee8bdbaf6ae7c0996d7a329b7bc3889ef618feb869b3e7aea117d9f4f3c15ab7ede488bb51", 0x64}], 0x1}, 0x4) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f00000001c0)) 03:37:15 executing program 5: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000280)={0xffffffffffffff9c}) r0 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x6, 0x20000) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000040)={0xfffffffffffffff7, "9ab64d7cd71177bccc03e97f0b7a2542819e49f85112e6505c34d5aae485804a", 0x3, 0x1}) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) ioctl$VIDIOC_S_OUTPUT(0xffffffffffffffff, 0xc004562f, &(0x7f0000000340)=0x2674) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mount(0x0, &(0x7f00000016c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = semget$private(0x0, 0x2, 0x0) semctl$IPC_INFO(r3, 0x4, 0x3, &(0x7f0000000200)=""/81) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) unshare(0x40000000) getsockopt$inet6_buf(r1, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) r4 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x0, 0x10000) accept$unix(r4, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f00000000c0)={0x0, 0x10000, 0x6, 0x2, 0xd}) sendmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000400)="1d367a56f5c42c3c55049d2090b3b67c6217944c321b2fb7a7279ff6002d771186d421f3e6fb1470d0416a6bf2d44f85002dac12c4669df60ef5216e6dfdc5ee8bdbaf6ae7c0996d7a329b7bc3889ef618feb869b3e7aea117d9f4f3c15ab7ede488bb51", 0x64}], 0x1}, 0x4) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f00000001c0)) 03:37:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndmidi(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000040)={0x10, 0xf0ffffff00000f00}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x48, 0x14, 0x207, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}, [@nested={0x0, 0x0, [@typed={0x300, 0x0, @fd}]}]}, 0x24c}}, 0x0) 03:37:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndmidi(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000040)={0x10, 0xf0ffffff00000f00}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x48, 0x14, 0x207, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}, [@nested={0x0, 0x0, [@typed={0x300, 0x0, @fd}]}]}, 0x24c}}, 0x0) 03:37:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndmidi(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000040)={0x10, 0xf0ffffff00000f00}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x48, 0x14, 0x207, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}, [@nested={0x0, 0x0, [@typed={0x300, 0x0, @fd}]}]}, 0x24c}}, 0x0) 03:37:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndmidi(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000040)={0x10, 0xf0ffffff00000f00}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x48, 0x14, 0x207, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}, [@nested={0x0, 0x0, [@typed={0x300, 0x0, @fd}]}]}, 0x24c}}, 0x0) 03:37:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndmidi(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000040)={0x10, 0xf0ffffff00000f00}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x48, 0x14, 0x207, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}, [@nested={0x0, 0x0, [@typed={0x300, 0x0, @fd}]}]}, 0x24c}}, 0x0) 03:37:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndmidi(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000040)={0x10, 0xf0ffffff00000f00}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x48, 0x14, 0x207, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}, [@nested={0x0, 0x0, [@typed={0x300, 0x0, @fd}]}]}, 0x24c}}, 0x0) 03:37:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndmidi(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000040)={0x10, 0xf0ffffff00000f00}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x48, 0x14, 0x207, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}, [@nested={0x0, 0x0, [@typed={0x300, 0x0, @fd}]}]}, 0x24c}}, 0x0) 03:37:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndmidi(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000040)={0x10, 0xf0ffffff00000f00}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x48, 0x14, 0x207, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}, [@nested={0x0, 0x0, [@typed={0x300, 0x0, @fd}]}]}, 0x24c}}, 0x0) 03:37:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") personality(0x5000008) uname(&(0x7f0000000080)=""/6) 03:37:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndmidi(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000040)={0x10, 0xf0ffffff00000f00}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x48, 0x14, 0x207, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}, [@nested={0x0, 0x0, [@typed={0x300, 0x0, @fd}]}]}, 0x24c}}, 0x0) 03:37:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") personality(0x5000008) uname(&(0x7f0000000080)=""/6) 03:37:15 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008032, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000447000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000997000/0x3000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x2, 0x10000000002) 03:37:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndmidi(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000040)={0x10, 0xf0ffffff00000f00}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x48, 0x14, 0x207, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}, [@nested={0x0, 0x0, [@typed={0x300, 0x0, @fd}]}]}, 0x24c}}, 0x0) 03:37:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") personality(0x5000008) uname(&(0x7f0000000080)=""/6) 03:37:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") socket$nl_xfrm(0xa, 0x3, 0x87) syz_emit_ethernet(0x4a, &(0x7f0000000040)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0xffffff87, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:37:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") personality(0x5000008) uname(&(0x7f0000000080)=""/6) 03:37:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000540)={'lo\x00', &(0x7f0000000000)=@ethtool_cmd={0x15}}) 03:37:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") personality(0x5000008) uname(&(0x7f0000000080)=""/6) [ 360.620250] sched: DL replenish lagged too much 03:37:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000540)={'lo\x00', &(0x7f0000000000)=@ethtool_cmd={0x15}}) 03:37:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") socket$nl_xfrm(0xa, 0x3, 0x87) syz_emit_ethernet(0x4a, &(0x7f0000000040)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0xffffff87, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:37:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndmidi(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000040)={0x10, 0xf0ffffff00000f00}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x48, 0x14, 0x207, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}, [@nested={0x0, 0x0, [@typed={0x300, 0x0, @fd}]}]}, 0x24c}}, 0x0) 03:37:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000540)={'lo\x00', &(0x7f0000000000)=@ethtool_cmd={0x15}}) 03:37:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") personality(0x5000008) uname(&(0x7f0000000080)=""/6) 03:37:16 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008032, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000447000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000997000/0x3000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x2, 0x10000000002) 03:37:16 executing program 4: setrlimit(0x7, &(0x7f0000000080)) signalfd4(0xffffffffffffffff, &(0x7f0000000100), 0x8, 0x0) 03:37:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") socket$nl_xfrm(0xa, 0x3, 0x87) syz_emit_ethernet(0x4a, &(0x7f0000000040)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0xffffff87, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:37:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000540)={'lo\x00', &(0x7f0000000000)=@ethtool_cmd={0x15}}) 03:37:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") personality(0x5000008) uname(&(0x7f0000000080)=""/6) 03:37:16 executing program 3: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:16 executing program 4: setrlimit(0x7, &(0x7f0000000080)) signalfd4(0xffffffffffffffff, &(0x7f0000000100), 0x8, 0x0) 03:37:16 executing program 2: setrlimit(0x7, &(0x7f0000000080)) signalfd4(0xffffffffffffffff, &(0x7f0000000100), 0x8, 0x0) 03:37:16 executing program 4: setrlimit(0x7, &(0x7f0000000080)) signalfd4(0xffffffffffffffff, &(0x7f0000000100), 0x8, 0x0) 03:37:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") socket$nl_xfrm(0xa, 0x3, 0x87) syz_emit_ethernet(0x4a, &(0x7f0000000040)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0xffffff87, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:37:16 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008032, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000447000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000997000/0x3000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x2, 0x10000000002) 03:37:16 executing program 2: setrlimit(0x7, &(0x7f0000000080)) signalfd4(0xffffffffffffffff, &(0x7f0000000100), 0x8, 0x0) 03:37:16 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008032, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000447000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000997000/0x3000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x2, 0x10000000002) 03:37:16 executing program 2: setrlimit(0x7, &(0x7f0000000080)) signalfd4(0xffffffffffffffff, &(0x7f0000000100), 0x8, 0x0) 03:37:16 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008032, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000447000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000997000/0x3000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x2, 0x10000000002) 03:37:16 executing program 4: setrlimit(0x7, &(0x7f0000000080)) signalfd4(0xffffffffffffffff, &(0x7f0000000100), 0x8, 0x0) 03:37:16 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008032, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000447000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000997000/0x3000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x2, 0x10000000002) 03:37:17 executing program 3: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:17 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008032, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000447000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000997000/0x3000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x2, 0x10000000002) 03:37:17 executing program 4: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:17 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008032, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000447000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000997000/0x3000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x2, 0x10000000002) 03:37:17 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008032, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000447000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000997000/0x3000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x2, 0x10000000002) 03:37:17 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008032, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000447000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000997000/0x3000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x2, 0x10000000002) 03:37:17 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008032, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000447000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000997000/0x3000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x2, 0x10000000002) 03:37:18 executing program 0: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:18 executing program 5: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:18 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:18 executing program 4: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:18 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008032, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000447000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000997000/0x3000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x2, 0x10000000002) 03:37:18 executing program 3: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:18 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:18 executing program 5: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:18 executing program 0: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:18 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008032, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000447000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000997000/0x3000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x2, 0x10000000002) 03:37:18 executing program 2: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:18 executing program 3: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:18 executing program 4: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:19 executing program 0: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:19 executing program 5: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:19 executing program 2: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:19 executing program 4: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:19 executing program 5: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:19 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:19 executing program 2: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:19 executing program 5: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:19 executing program 3: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:19 executing program 0: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:19 executing program 4: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:20 executing program 5: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:20 executing program 3: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:20 executing program 0: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:20 executing program 4: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:20 executing program 2: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:20 executing program 3: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:20 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:20 executing program 0: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:20 executing program 2: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:20 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008032, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000447000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000997000/0x3000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x2, 0x10000000002) 03:37:20 executing program 4: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000000) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f0000003d40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x16d, &(0x7f0000003740), 0x1f4, &(0x7f0000000140), 0xcf}}], 0x40000000000027f, 0x0) 03:37:20 executing program 4: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000000) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f0000003d40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x16d, &(0x7f0000003740), 0x1f4, &(0x7f0000000140), 0xcf}}], 0x40000000000027f, 0x0) 03:37:20 executing program 4: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000000) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f0000003d40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x16d, &(0x7f0000003740), 0x1f4, &(0x7f0000000140), 0xcf}}], 0x40000000000027f, 0x0) 03:37:20 executing program 4: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000000) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f0000003d40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x16d, &(0x7f0000003740), 0x1f4, &(0x7f0000000140), 0xcf}}], 0x40000000000027f, 0x0) 03:37:20 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008032, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000447000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000997000/0x3000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x2, 0x10000000002) 03:37:21 executing program 4: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000000) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f0000003d40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x16d, &(0x7f0000003740), 0x1f4, &(0x7f0000000140), 0xcf}}], 0x40000000000027f, 0x0) 03:37:21 executing program 2: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:21 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:21 executing program 0: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000000) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f0000003d40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x16d, &(0x7f0000003740), 0x1f4, &(0x7f0000000140), 0xcf}}], 0x40000000000027f, 0x0) 03:37:21 executing program 4: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000000) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f0000003d40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x16d, &(0x7f0000003740), 0x1f4, &(0x7f0000000140), 0xcf}}], 0x40000000000027f, 0x0) 03:37:21 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008032, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000447000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000997000/0x3000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x2, 0x10000000002) 03:37:21 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000000) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f0000003d40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x16d, &(0x7f0000003740), 0x1f4, &(0x7f0000000140), 0xcf}}], 0x40000000000027f, 0x0) 03:37:21 executing program 0: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000000) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f0000003d40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x16d, &(0x7f0000003740), 0x1f4, &(0x7f0000000140), 0xcf}}], 0x40000000000027f, 0x0) 03:37:21 executing program 4: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000000) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f0000003d40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x16d, &(0x7f0000003740), 0x1f4, &(0x7f0000000140), 0xcf}}], 0x40000000000027f, 0x0) 03:37:21 executing program 0: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000000) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f0000003d40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x16d, &(0x7f0000003740), 0x1f4, &(0x7f0000000140), 0xcf}}], 0x40000000000027f, 0x0) 03:37:21 executing program 1: setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000900)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1}}}, 0x90) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) setpriority(0x0, r0, 0x10000) r1 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mkdir(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3, 0x18, 0x0) readlink(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)=""/16, 0x10) getrandom(0x0, 0x0, 0x1) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f00000000c0)) setxattr$security_capability(0x0, &(0x7f0000000240)='security.capability\x00', 0x0, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000003c0)='\x00'], &(0x7f0000000ac0)) 03:37:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 03:37:21 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000000) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f0000003d40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x16d, &(0x7f0000003740), 0x1f4, &(0x7f0000000140), 0xcf}}], 0x40000000000027f, 0x0) 03:37:21 executing program 4: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) exit(0x0) sendfile(r0, r0, 0x0, 0x633e) 03:37:21 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000000) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f0000003d40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x16d, &(0x7f0000003740), 0x1f4, &(0x7f0000000140), 0xcf}}], 0x40000000000027f, 0x0) 03:37:21 executing program 0: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0xc51d}], 0x1}, 0x0) shutdown(r0, 0x1) shutdown(r0, 0x1) 03:37:21 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000300)=ANY=[@ANYBLOB="0f2b9b"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000039000/0x18000)=nil, 0x0, 0x2cb, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:37:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 03:37:22 executing program 3: socket$packet(0x11, 0x0, 0x300) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="a84a2ae92c431c420f05bf07000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80d1e3e30b110fb8c4014e4e0b5b5b016d7d14dee509c421045f4607c422adaf50e3c42a0b9ec45b70c4c4420f0fcca4c483397fd300f7dcdc470bbcafaf10f138f653afaf6766f2ab440fec3facacc4c3214cb9a5604b19c201b00b000000f08171a30b8a826e670f542c3d271c0000a80dd4d48f6978d25debe8628f68088f89e092ca218de3c0f52641802d08000000fa49c4f6a1dd7dbbbfdd5c6666430f3a15150e00000024bedcdca1c9fb110f66474f383ae34ba29fb7e2") recvmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 03:37:22 executing program 0: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0xc51d}], 0x1}, 0x0) shutdown(r0, 0x1) shutdown(r0, 0x1) 03:37:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 03:37:22 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000300)=ANY=[@ANYBLOB="0f2b9b"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000039000/0x18000)=nil, 0x0, 0x2cb, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:37:22 executing program 0: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0xc51d}], 0x1}, 0x0) shutdown(r0, 0x1) shutdown(r0, 0x1) 03:37:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 03:37:22 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000300)=ANY=[@ANYBLOB="0f2b9b"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000039000/0x18000)=nil, 0x0, 0x2cb, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:37:22 executing program 4: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) exit(0x0) sendfile(r0, r0, 0x0, 0x633e) 03:37:22 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000300)=ANY=[@ANYBLOB="0f2b9b"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000039000/0x18000)=nil, 0x0, 0x2cb, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:37:22 executing program 0: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0xc51d}], 0x1}, 0x0) shutdown(r0, 0x1) shutdown(r0, 0x1) 03:37:22 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000300)=ANY=[@ANYBLOB="0f2b9b"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000039000/0x18000)=nil, 0x0, 0x2cb, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:37:22 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000300)=ANY=[@ANYBLOB="0f2b9b"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000039000/0x18000)=nil, 0x0, 0x2cb, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:37:22 executing program 3: socket$packet(0x11, 0x0, 0x300) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="a84a2ae92c431c420f05bf07000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80d1e3e30b110fb8c4014e4e0b5b5b016d7d14dee509c421045f4607c422adaf50e3c42a0b9ec45b70c4c4420f0fcca4c483397fd300f7dcdc470bbcafaf10f138f653afaf6766f2ab440fec3facacc4c3214cb9a5604b19c201b00b000000f08171a30b8a826e670f542c3d271c0000a80dd4d48f6978d25debe8628f68088f89e092ca218de3c0f52641802d08000000fa49c4f6a1dd7dbbbfdd5c6666430f3a15150e00000024bedcdca1c9fb110f66474f383ae34ba29fb7e2") recvmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 03:37:22 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) exit(0x0) sendfile(r0, r0, 0x0, 0x633e) 03:37:22 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000300)=ANY=[@ANYBLOB="0f2b9b"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000039000/0x18000)=nil, 0x0, 0x2cb, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:37:22 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000300)=ANY=[@ANYBLOB="0f2b9b"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000039000/0x18000)=nil, 0x0, 0x2cb, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:37:22 executing program 5: socket$packet(0x11, 0x0, 0x300) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="a84a2ae92c431c420f05bf07000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80d1e3e30b110fb8c4014e4e0b5b5b016d7d14dee509c421045f4607c422adaf50e3c42a0b9ec45b70c4c4420f0fcca4c483397fd300f7dcdc470bbcafaf10f138f653afaf6766f2ab440fec3facacc4c3214cb9a5604b19c201b00b000000f08171a30b8a826e670f542c3d271c0000a80dd4d48f6978d25debe8628f68088f89e092ca218de3c0f52641802d08000000fa49c4f6a1dd7dbbbfdd5c6666430f3a15150e00000024bedcdca1c9fb110f66474f383ae34ba29fb7e2") recvmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 03:37:23 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000300)=ANY=[@ANYBLOB="0f2b9b"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000039000/0x18000)=nil, 0x0, 0x2cb, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:37:23 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000300)=ANY=[@ANYBLOB="0f2b9b"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000039000/0x18000)=nil, 0x0, 0x2cb, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:37:23 executing program 4: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) exit(0x0) sendfile(r0, r0, 0x0, 0x633e) 03:37:23 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000300)=ANY=[@ANYBLOB="0f2b9b"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000039000/0x18000)=nil, 0x0, 0x2cb, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:37:23 executing program 1: socket$packet(0x11, 0x0, 0x300) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="a84a2ae92c431c420f05bf07000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80d1e3e30b110fb8c4014e4e0b5b5b016d7d14dee509c421045f4607c422adaf50e3c42a0b9ec45b70c4c4420f0fcca4c483397fd300f7dcdc470bbcafaf10f138f653afaf6766f2ab440fec3facacc4c3214cb9a5604b19c201b00b000000f08171a30b8a826e670f542c3d271c0000a80dd4d48f6978d25debe8628f68088f89e092ca218de3c0f52641802d08000000fa49c4f6a1dd7dbbbfdd5c6666430f3a15150e00000024bedcdca1c9fb110f66474f383ae34ba29fb7e2") recvmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 03:37:23 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) exit(0x0) sendfile(r0, r0, 0x0, 0x633e) 03:37:23 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000300)=ANY=[@ANYBLOB="0f2b9b"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000039000/0x18000)=nil, 0x0, 0x2cb, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:37:24 executing program 3: socket$packet(0x11, 0x0, 0x300) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="a84a2ae92c431c420f05bf07000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80d1e3e30b110fb8c4014e4e0b5b5b016d7d14dee509c421045f4607c422adaf50e3c42a0b9ec45b70c4c4420f0fcca4c483397fd300f7dcdc470bbcafaf10f138f653afaf6766f2ab440fec3facacc4c3214cb9a5604b19c201b00b000000f08171a30b8a826e670f542c3d271c0000a80dd4d48f6978d25debe8628f68088f89e092ca218de3c0f52641802d08000000fa49c4f6a1dd7dbbbfdd5c6666430f3a15150e00000024bedcdca1c9fb110f66474f383ae34ba29fb7e2") recvmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 03:37:24 executing program 5: socket$packet(0x11, 0x0, 0x300) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="a84a2ae92c431c420f05bf07000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80d1e3e30b110fb8c4014e4e0b5b5b016d7d14dee509c421045f4607c422adaf50e3c42a0b9ec45b70c4c4420f0fcca4c483397fd300f7dcdc470bbcafaf10f138f653afaf6766f2ab440fec3facacc4c3214cb9a5604b19c201b00b000000f08171a30b8a826e670f542c3d271c0000a80dd4d48f6978d25debe8628f68088f89e092ca218de3c0f52641802d08000000fa49c4f6a1dd7dbbbfdd5c6666430f3a15150e00000024bedcdca1c9fb110f66474f383ae34ba29fb7e2") recvmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 03:37:24 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000300)=ANY=[@ANYBLOB="0f2b9b"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000039000/0x18000)=nil, 0x0, 0x2cb, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:37:24 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0xc51d}], 0x1}, 0x0) shutdown(r0, 0x1) shutdown(r0, 0x1) 03:37:24 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0xc51d}], 0x1}, 0x0) shutdown(r0, 0x1) shutdown(r0, 0x1) 03:37:24 executing program 4: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) exit(0x0) sendfile(r0, r0, 0x0, 0x633e) 03:37:24 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0xc51d}], 0x1}, 0x0) shutdown(r0, 0x1) shutdown(r0, 0x1) 03:37:24 executing program 1: socket$packet(0x11, 0x0, 0x300) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="a84a2ae92c431c420f05bf07000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80d1e3e30b110fb8c4014e4e0b5b5b016d7d14dee509c421045f4607c422adaf50e3c42a0b9ec45b70c4c4420f0fcca4c483397fd300f7dcdc470bbcafaf10f138f653afaf6766f2ab440fec3facacc4c3214cb9a5604b19c201b00b000000f08171a30b8a826e670f542c3d271c0000a80dd4d48f6978d25debe8628f68088f89e092ca218de3c0f52641802d08000000fa49c4f6a1dd7dbbbfdd5c6666430f3a15150e00000024bedcdca1c9fb110f66474f383ae34ba29fb7e2") recvmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 03:37:24 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) exit(0x0) sendfile(r0, r0, 0x0, 0x633e) 03:37:24 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0xc51d}], 0x1}, 0x0) shutdown(r0, 0x1) shutdown(r0, 0x1) 03:37:24 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0xc51d}], 0x1}, 0x0) shutdown(r0, 0x1) shutdown(r0, 0x1) 03:37:25 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0xc51d}], 0x1}, 0x0) shutdown(r0, 0x1) shutdown(r0, 0x1) 03:37:25 executing program 3: socket$packet(0x11, 0x0, 0x300) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="a84a2ae92c431c420f05bf07000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80d1e3e30b110fb8c4014e4e0b5b5b016d7d14dee509c421045f4607c422adaf50e3c42a0b9ec45b70c4c4420f0fcca4c483397fd300f7dcdc470bbcafaf10f138f653afaf6766f2ab440fec3facacc4c3214cb9a5604b19c201b00b000000f08171a30b8a826e670f542c3d271c0000a80dd4d48f6978d25debe8628f68088f89e092ca218de3c0f52641802d08000000fa49c4f6a1dd7dbbbfdd5c6666430f3a15150e00000024bedcdca1c9fb110f66474f383ae34ba29fb7e2") recvmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 03:37:25 executing program 5: socket$packet(0x11, 0x0, 0x300) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="a84a2ae92c431c420f05bf07000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80d1e3e30b110fb8c4014e4e0b5b5b016d7d14dee509c421045f4607c422adaf50e3c42a0b9ec45b70c4c4420f0fcca4c483397fd300f7dcdc470bbcafaf10f138f653afaf6766f2ab440fec3facacc4c3214cb9a5604b19c201b00b000000f08171a30b8a826e670f542c3d271c0000a80dd4d48f6978d25debe8628f68088f89e092ca218de3c0f52641802d08000000fa49c4f6a1dd7dbbbfdd5c6666430f3a15150e00000024bedcdca1c9fb110f66474f383ae34ba29fb7e2") recvmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 03:37:25 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0xc51d}], 0x1}, 0x0) shutdown(r0, 0x1) shutdown(r0, 0x1) 03:37:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB=',fscontext=']) clone(0x21a2101ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) [ 370.220815] SELinux: unknown mount option 03:37:25 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0xc51d}], 0x1}, 0x0) shutdown(r0, 0x1) shutdown(r0, 0x1) 03:37:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB=',fscontext=']) clone(0x21a2101ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) 03:37:25 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB=',fscontext=']) clone(0x21a2101ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) [ 370.415381] SELinux: unknown mount option [ 370.517135] SELinux: unknown mount option 03:37:26 executing program 1: socket$packet(0x11, 0x0, 0x300) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) fanotify_init(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="a84a2ae92c431c420f05bf07000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80d1e3e30b110fb8c4014e4e0b5b5b016d7d14dee509c421045f4607c422adaf50e3c42a0b9ec45b70c4c4420f0fcca4c483397fd300f7dcdc470bbcafaf10f138f653afaf6766f2ab440fec3facacc4c3214cb9a5604b19c201b00b000000f08171a30b8a826e670f542c3d271c0000a80dd4d48f6978d25debe8628f68088f89e092ca218de3c0f52641802d08000000fa49c4f6a1dd7dbbbfdd5c6666430f3a15150e00000024bedcdca1c9fb110f66474f383ae34ba29fb7e2") recvmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 03:37:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB=',fscontext=']) clone(0x21a2101ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) 03:37:26 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0xc51d}], 0x1}, 0x0) shutdown(r0, 0x1) shutdown(r0, 0x1) 03:37:26 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB=',fscontext=']) clone(0x21a2101ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) 03:37:26 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="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", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) 03:37:26 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB=',fscontext=']) clone(0x21a2101ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) [ 370.853909] SELinux: unknown mount option [ 370.865984] SELinux: unknown mount option [ 370.948036] SELinux: unknown mount option [ 370.963407] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 03:37:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r1, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x5}, 0x10) connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 03:37:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB=',fscontext=']) clone(0x21a2101ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, &(0x7f0000000480)) 03:37:26 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x14, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000000)=[@register_looper], 0x1, 0x0, &(0x7f0000000040)="f0"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000540)={0x4c, 0x0, &(0x7f0000000300)=[@reply_sg={0x40486312, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}], 0x0, 0x0, 0x0}) 03:37:26 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="b77aa0c6be9f2a06fcd1ddbce5cfbb07a954d6096b54bc90706d0121942014015779d24f2fd71085cafcc5a8fdde88e7fb4db063fabc53d78918aaaf20dfe42eef1e48634baca69dd56fea98351c4feb400e33a62de8328a90e332083a63a6e3e2e8650d455f274ff78f697e62b05c5bf63d4ac8d35e53e5c1a2dfc110804620c802a85a525dc47afbe7ad06d4a0f8d273f5a6f267150c191fd96fe9ace8fb56f41cfb7bcabe27f4bcd758163c3d08e69bfffc14865881ca151cd7c0925e54ef99b4d7cc1b3e4326ca81d40800000000000000ba58100e442a10fd3c02f074c0297bb1f86bf0491a2b89dc541e034d39efc5fa85c59668303d86589634ce834ec849be1a1fe549c19f740d6cf1dd36782fa2f3a43ccdd12c3c566c3523ca8d7cc0f27a0b0a223fb9c360a7a186cc8be1e16b0657ee6a2d9dffe5745533", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) 03:37:26 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="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", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) [ 371.395681] audit: type=1400 audit(2000000246.716:134): avc: denied { call } for pid=20307 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 [ 371.423076] binder: 20307:20309 ERROR: BC_REGISTER_LOOPER called without request [ 371.427046] SELinux: unknown mount option 03:37:26 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="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", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) [ 371.454367] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. [ 371.464469] binder_alloc: 20307: binder_alloc_buf, no vma [ 371.518016] binder: 20307:20309 transaction failed 29189/-3, size 0-0 line 2917 [ 371.594353] binder: send failed reply for transaction 7 to 20307:20309 [ 371.657763] binder: undelivered TRANSACTION_COMPLETE [ 371.663916] binder: undelivered TRANSACTION_ERROR: 29189 [ 371.679777] binder: undelivered TRANSACTION_ERROR: 29190 [ 371.689989] binder: 20307:20309 ERROR: BC_REGISTER_LOOPER called without request 03:37:27 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="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", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) [ 371.703423] binder: 20307:20326 got reply transaction with no transaction stack 03:37:27 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="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", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) 03:37:27 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="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", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) 03:37:27 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="b77aa0c6be9f2a06fcd1ddbce5cfbb07a954d6096b54bc90706d0121942014015779d24f2fd71085cafcc5a8fdde88e7fb4db063fabc53d78918aaaf20dfe42eef1e48634baca69dd56fea98351c4feb400e33a62de8328a90e332083a63a6e3e2e8650d455f274ff78f697e62b05c5bf63d4ac8d35e53e5c1a2dfc110804620c802a85a525dc47afbe7ad06d4a0f8d273f5a6f267150c191fd96fe9ace8fb56f41cfb7bcabe27f4bcd758163c3d08e69bfffc14865881ca151cd7c0925e54ef99b4d7cc1b3e4326ca81d40800000000000000ba58100e442a10fd3c02f074c0297bb1f86bf0491a2b89dc541e034d39efc5fa85c59668303d86589634ce834ec849be1a1fe549c19f740d6cf1dd36782fa2f3a43ccdd12c3c566c3523ca8d7cc0f27a0b0a223fb9c360a7a186cc8be1e16b0657ee6a2d9dffe5745533", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) [ 371.741140] binder: release 20307:20326 transaction 10 out, still active [ 371.748296] binder: 20307:20326 transaction failed 29201/-71, size 0-0 line 2709 [ 371.775355] binder: undelivered TRANSACTION_COMPLETE 03:37:27 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x14, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000000)=[@register_looper], 0x1, 0x0, &(0x7f0000000040)="f0"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000540)={0x4c, 0x0, &(0x7f0000000300)=[@reply_sg={0x40486312, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}], 0x0, 0x0, 0x0}) [ 371.847745] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 371.856881] binder: release 20307:20309 transaction 10 in, still active [ 371.856910] binder: send failed reply for transaction 10, target dead [ 371.856931] binder: undelivered TRANSACTION_ERROR: 29201 [ 371.885518] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 03:37:27 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x14, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000000)=[@register_looper], 0x1, 0x0, &(0x7f0000000040)="f0"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000540)={0x4c, 0x0, &(0x7f0000000300)=[@reply_sg={0x40486312, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}], 0x0, 0x0, 0x0}) [ 371.911885] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 371.944764] binder: 20341:20344 ERROR: BC_REGISTER_LOOPER called without request [ 371.974609] binder_alloc: 20341: binder_alloc_buf, no vma [ 371.985232] binder: 20341:20344 transaction failed 29189/-3, size 0-0 line 2917 [ 372.010552] binder: send failed reply for transaction 13 to 20341:20344 [ 372.024965] binder: undelivered TRANSACTION_COMPLETE [ 372.030294] binder: undelivered TRANSACTION_ERROR: 29189 [ 372.045906] binder: BINDER_SET_CONTEXT_MGR already set [ 372.051872] binder: 20345:20347 ioctl 40046207 0 returned -16 [ 372.051880] binder: undelivered TRANSACTION_ERROR: 29190 [ 372.065063] binder: 20345:20347 transaction failed 29189/-22, size 0-0 line 2802 [ 372.080931] binder: 20345:20347 ERROR: BC_REGISTER_LOOPER called without request [ 372.126416] binder: 20345:20350 got reply transaction with no transaction stack [ 372.134193] binder: 20345:20350 transaction failed 29201/-71, size 0-0 line 2709 03:37:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r1, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x5}, 0x10) connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 03:37:27 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="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", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) 03:37:27 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="b77aa0c6be9f2a06fcd1ddbce5cfbb07a954d6096b54bc90706d0121942014015779d24f2fd71085cafcc5a8fdde88e7fb4db063fabc53d78918aaaf20dfe42eef1e48634baca69dd56fea98351c4feb400e33a62de8328a90e332083a63a6e3e2e8650d455f274ff78f697e62b05c5bf63d4ac8d35e53e5c1a2dfc110804620c802a85a525dc47afbe7ad06d4a0f8d273f5a6f267150c191fd96fe9ace8fb56f41cfb7bcabe27f4bcd758163c3d08e69bfffc14865881ca151cd7c0925e54ef99b4d7cc1b3e4326ca81d40800000000000000ba58100e442a10fd3c02f074c0297bb1f86bf0491a2b89dc541e034d39efc5fa85c59668303d86589634ce834ec849be1a1fe549c19f740d6cf1dd36782fa2f3a43ccdd12c3c566c3523ca8d7cc0f27a0b0a223fb9c360a7a186cc8be1e16b0657ee6a2d9dffe5745533", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) 03:37:27 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x14, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000000)=[@register_looper], 0x1, 0x0, &(0x7f0000000040)="f0"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000540)={0x4c, 0x0, &(0x7f0000000300)=[@reply_sg={0x40486312, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}], 0x0, 0x0, 0x0}) 03:37:27 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="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", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) 03:37:27 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="b77aa0c6be9f2a06fcd1ddbce5cfbb07a954d6096b54bc90706d0121942014015779d24f2fd71085cafcc5a8fdde88e7fb4db063fabc53d78918aaaf20dfe42eef1e48634baca69dd56fea98351c4feb400e33a62de8328a90e332083a63a6e3e2e8650d455f274ff78f697e62b05c5bf63d4ac8d35e53e5c1a2dfc110804620c802a85a525dc47afbe7ad06d4a0f8d273f5a6f267150c191fd96fe9ace8fb56f41cfb7bcabe27f4bcd758163c3d08e69bfffc14865881ca151cd7c0925e54ef99b4d7cc1b3e4326ca81d40800000000000000ba58100e442a10fd3c02f074c0297bb1f86bf0491a2b89dc541e034d39efc5fa85c59668303d86589634ce834ec849be1a1fe549c19f740d6cf1dd36782fa2f3a43ccdd12c3c566c3523ca8d7cc0f27a0b0a223fb9c360a7a186cc8be1e16b0657ee6a2d9dffe5745533", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) [ 372.452141] binder: 20355:20363 ERROR: BC_REGISTER_LOOPER called without request [ 372.462778] binder_alloc: 20355: binder_alloc_buf, no vma [ 372.468714] binder: 20355:20363 transaction failed 29189/-3, size 0-0 line 2917 [ 372.478386] binder: send failed reply for transaction 18 to 20355:20363 [ 372.497415] binder: undelivered TRANSACTION_COMPLETE [ 372.506692] binder: undelivered TRANSACTION_ERROR: 29189 03:37:27 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x14, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000000)=[@register_looper], 0x1, 0x0, &(0x7f0000000040)="f0"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000540)={0x4c, 0x0, &(0x7f0000000300)=[@reply_sg={0x40486312, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}], 0x0, 0x0, 0x0}) [ 372.548459] binder: undelivered TRANSACTION_ERROR: 29190 03:37:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r1, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x5}, 0x10) connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 03:37:27 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="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", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) 03:37:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r1, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x5}, 0x10) connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 372.649097] binder: 20371:20374 ERROR: BC_REGISTER_LOOPER called without request [ 372.701727] binder: 20371:20381 got reply transaction with no transaction stack [ 372.736426] binder: 20371:20381 transaction failed 29201/-71, size 0-0 line 2709 [ 372.738914] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 372.771448] binder: release 20371:20374 transaction 21 out, still active [ 372.787113] binder: undelivered TRANSACTION_COMPLETE 03:37:28 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x14, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000000)=[@register_looper], 0x1, 0x0, &(0x7f0000000040)="f0"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000540)={0x4c, 0x0, &(0x7f0000000300)=[@reply_sg={0x40486312, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}], 0x0, 0x0, 0x0}) [ 372.808849] binder: release 20371:20374 transaction 21 in, still active [ 372.847363] binder: send failed reply for transaction 21, target dead 03:37:28 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x14, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000000)=[@register_looper], 0x1, 0x0, &(0x7f0000000040)="f0"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000540)={0x4c, 0x0, &(0x7f0000000300)=[@reply_sg={0x40486312, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}], 0x0, 0x0, 0x0}) [ 372.897068] binder: undelivered TRANSACTION_ERROR: 29201 [ 372.908349] binder: 20388:20390 ERROR: BC_REGISTER_LOOPER called without request [ 372.926178] binder: undelivered TRANSACTION_ERROR: 29189 [ 372.960605] binder: 20388:20391 got reply transaction with no transaction stack [ 372.981031] binder: undelivered TRANSACTION_ERROR: 29201 [ 373.005230] binder: 20388:20391 transaction failed 29201/-71, size 0-0 line 2709 [ 373.014671] binder: BINDER_SET_CONTEXT_MGR already set [ 373.034825] binder: 20393:20394 ioctl 40046207 0 returned -16 [ 373.034830] binder: release 20388:20390 transaction 24 out, still active [ 373.034840] binder: undelivered TRANSACTION_COMPLETE [ 373.059153] binder: 20393:20394 ERROR: BC_REGISTER_LOOPER called without request [ 373.081641] binder: release 20388:20390 transaction 24 in, still active [ 373.100576] binder: send failed reply for transaction 24, target dead [ 373.107436] binder: 20393:20396 got reply transaction with no transaction stack [ 373.125490] binder: undelivered TRANSACTION_ERROR: 29201 [ 373.135165] binder: 20393:20396 transaction failed 29201/-71, size 0-0 line 2709 [ 373.143071] binder: send failed reply for transaction 26 to 20393:20394 03:37:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r1, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x5}, 0x10) connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 03:37:28 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x14, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000000)=[@register_looper], 0x1, 0x0, &(0x7f0000000040)="f0"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000540)={0x4c, 0x0, &(0x7f0000000300)=[@reply_sg={0x40486312, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}], 0x0, 0x0, 0x0}) 03:37:28 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x14, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000000)=[@register_looper], 0x1, 0x0, &(0x7f0000000040)="f0"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000540)={0x4c, 0x0, &(0x7f0000000300)=[@reply_sg={0x40486312, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}], 0x0, 0x0, 0x0}) [ 373.228150] binder: 20397:20400 ERROR: BC_REGISTER_LOOPER called without request [ 373.241277] binder_alloc: 20397: binder_alloc_buf, no vma [ 373.249198] binder: BINDER_SET_CONTEXT_MGR already set [ 373.255227] binder: 20398:20402 ioctl 40046207 0 returned -16 [ 373.257604] binder: 20397:20400 transaction failed 29189/-3, size 0-0 line 2917 [ 373.266341] binder: 20398:20402 ERROR: BC_REGISTER_LOOPER called without request [ 373.274722] binder: send failed reply for transaction 29 to 20397:20400 [ 373.290888] binder: undelivered TRANSACTION_COMPLETE [ 373.296020] binder: undelivered TRANSACTION_ERROR: 29189 [ 373.311681] binder: undelivered TRANSACTION_ERROR: 29190 [ 373.317206] binder: send failed reply for transaction 31 to 20398:20402 03:37:28 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x14, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000000)=[@register_looper], 0x1, 0x0, &(0x7f0000000040)="f0"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000540)={0x4c, 0x0, &(0x7f0000000300)=[@reply_sg={0x40486312, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}], 0x0, 0x0, 0x0}) [ 373.324297] binder: 20398:20405 got reply transaction with no transaction stack [ 373.337808] binder: 20398:20405 transaction failed 29201/-71, size 0-0 line 2709 [ 373.354006] binder: 20407:20408 ERROR: BC_REGISTER_LOOPER called without request [ 373.367399] binder_alloc: 20407: binder_alloc_buf, no vma [ 373.373851] binder: 20407:20408 transaction failed 29189/-3, size 0-0 line 2917 [ 373.390978] binder: send failed reply for transaction 34 to 20407:20408 [ 373.403446] binder: undelivered TRANSACTION_COMPLETE [ 373.409009] binder: undelivered TRANSACTION_ERROR: 29189 03:37:28 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x14, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000000)=[@register_looper], 0x1, 0x0, &(0x7f0000000040)="f0"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000540)={0x4c, 0x0, &(0x7f0000000300)=[@reply_sg={0x40486312, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}], 0x0, 0x0, 0x0}) [ 373.428576] binder: undelivered TRANSACTION_ERROR: 29190 03:37:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r1, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x5}, 0x10) connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 373.491219] binder: 20409:20411 ERROR: BC_REGISTER_LOOPER called without request [ 373.502735] binder_alloc: 20409: binder_alloc_buf, no vma [ 373.523291] binder: 20409:20411 transaction failed 29189/-3, size 0-0 line 2917 03:37:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r1, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x5}, 0x10) connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 03:37:28 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x14, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000000)=[@register_looper], 0x1, 0x0, &(0x7f0000000040)="f0"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000540)={0x4c, 0x0, &(0x7f0000000300)=[@reply_sg={0x40486312, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}], 0x0, 0x0, 0x0}) [ 373.545518] binder: send failed reply for transaction 37 to 20409:20411 [ 373.563785] binder: undelivered TRANSACTION_COMPLETE [ 373.569457] binder: undelivered TRANSACTION_ERROR: 29189 [ 373.586582] binder: undelivered TRANSACTION_ERROR: 29190 [ 373.653449] binder: 20419:20421 ERROR: BC_REGISTER_LOOPER called without request [ 373.675758] binder_alloc: 20419: binder_alloc_buf, no vma [ 373.682233] binder: 20419:20421 transaction failed 29189/-3, size 0-0 line 2917 [ 373.690210] binder: send failed reply for transaction 40 to 20419:20421 03:37:29 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x14, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000000)=[@register_looper], 0x1, 0x0, &(0x7f0000000040)="f0"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000540)={0x4c, 0x0, &(0x7f0000000300)=[@reply_sg={0x40486312, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}], 0x0, 0x0, 0x0}) [ 373.708946] binder: undelivered TRANSACTION_COMPLETE [ 373.714478] binder: undelivered TRANSACTION_ERROR: 29189 [ 373.746765] binder: undelivered TRANSACTION_ERROR: 29190 [ 373.799983] binder: undelivered TRANSACTION_COMPLETE [ 373.813032] binder: undelivered TRANSACTION_ERROR: 29189 [ 373.836237] binder: 20424:20425 ERROR: BC_REGISTER_LOOPER called without request [ 373.837344] binder: undelivered TRANSACTION_ERROR: 29201 03:37:29 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x14, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000000)=[@register_looper], 0x1, 0x0, &(0x7f0000000040)="f0"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000540)={0x4c, 0x0, &(0x7f0000000300)=[@reply_sg={0x40486312, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}], 0x0, 0x0, 0x0}) [ 373.859085] binder_alloc: 20424: binder_alloc_buf, no vma [ 373.873099] binder: 20424:20425 transaction failed 29189/-3, size 0-0 line 2917 [ 373.884612] binder: send failed reply for transaction 43 to 20424:20425 [ 373.895663] binder: BINDER_SET_CONTEXT_MGR already set 03:37:29 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x14, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000000)=[@register_looper], 0x1, 0x0, &(0x7f0000000040)="f0"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000540)={0x4c, 0x0, &(0x7f0000000300)=[@reply_sg={0x40486312, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}], 0x0, 0x0, 0x0}) [ 373.906184] binder: 20427:20428 ioctl 40046207 0 returned -16 [ 373.906198] binder: undelivered TRANSACTION_COMPLETE [ 373.916973] binder: 20427:20428 ERROR: BC_REGISTER_LOOPER called without request [ 373.923128] binder: undelivered TRANSACTION_ERROR: 29189 [ 373.943823] binder: undelivered TRANSACTION_ERROR: 29190 [ 373.949368] binder: send failed reply for transaction 45 to 20427:20428 [ 373.963412] binder: 20430:20431 ERROR: BC_REGISTER_LOOPER called without request [ 373.970135] binder: 20427:20432 got reply transaction with no transaction stack [ 373.978917] binder: 20427:20432 transaction failed 29201/-71, size 0-0 line 2709 [ 373.982837] binder_alloc: 20430: binder_alloc_buf, no vma [ 373.992573] binder: 20430:20431 transaction failed 29189/-3, size 0-0 line 2917 [ 374.000233] binder: send failed reply for transaction 47 to 20430:20431 03:37:29 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="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", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) [ 374.014392] binder: undelivered TRANSACTION_COMPLETE [ 374.019504] binder: undelivered TRANSACTION_ERROR: 29189 [ 374.032771] binder: undelivered TRANSACTION_ERROR: 29190 03:37:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r1, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x5}, 0x10) connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 03:37:29 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x14, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000000)=[@register_looper], 0x1, 0x0, &(0x7f0000000040)="f0"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000540)={0x4c, 0x0, &(0x7f0000000300)=[@reply_sg={0x40486312, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}], 0x0, 0x0, 0x0}) [ 374.069130] binder: undelivered TRANSACTION_COMPLETE [ 374.074592] binder: undelivered TRANSACTION_ERROR: 29189 [ 374.102504] binder: undelivered TRANSACTION_ERROR: 29201 03:37:29 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="b77aa0c6be9f2a06fcd1ddbce5cfbb07a954d6096b54bc90706d0121942014015779d24f2fd71085cafcc5a8fdde88e7fb4db063fabc53d78918aaaf20dfe42eef1e48634baca69dd56fea98351c4feb400e33a62de8328a90e332083a63a6e3e2e8650d455f274ff78f697e62b05c5bf63d4ac8d35e53e5c1a2dfc110804620c802a85a525dc47afbe7ad06d4a0f8d273f5a6f267150c191fd96fe9ace8fb56f41cfb7bcabe27f4bcd758163c3d08e69bfffc14865881ca151cd7c0925e54ef99b4d7cc1b3e4326ca81d40800000000000000ba58100e442a10fd3c02f074c0297bb1f86bf0491a2b89dc541e034d39efc5fa85c59668303d86589634ce834ec849be1a1fe549c19f740d6cf1dd36782fa2f3a43ccdd12c3c566c3523ca8d7cc0f27a0b0a223fb9c360a7a186cc8be1e16b0657ee6a2d9dffe5745533", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) [ 374.122954] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 374.159299] binder: 20438:20441 ERROR: BC_REGISTER_LOOPER called without request [ 374.170453] binder_alloc: 20438: binder_alloc_buf, no vma [ 374.184303] binder: 20438:20441 transaction failed 29189/-3, size 0-0 line 2917 [ 374.202517] binder: send failed reply for transaction 51 to 20438:20441 03:37:29 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="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", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) 03:37:29 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="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", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) [ 374.219872] binder: undelivered TRANSACTION_COMPLETE [ 374.225375] binder: undelivered TRANSACTION_ERROR: 29189 [ 374.229531] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 374.259483] binder: undelivered TRANSACTION_ERROR: 29190 03:37:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r1, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x5}, 0x10) connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) [ 374.362643] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 03:37:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r1, &(0x7f0000000040)={0x1a, 0x1, 0x1f, 0x0, 0x0, 0x5}, 0x10) connect$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 03:37:29 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="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", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) 03:37:29 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="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", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) [ 374.563913] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 374.696369] binder: undelivered TRANSACTION_COMPLETE [ 374.702219] binder: undelivered TRANSACTION_ERROR: 29189 03:37:30 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="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", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) 03:37:30 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="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", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) 03:37:30 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="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", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) [ 374.738687] binder: undelivered TRANSACTION_ERROR: 29201 03:37:30 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="b77aa0c6be9f2a06fcd1ddbce5cfbb07a954d6096b54bc90706d0121942014015779d24f2fd71085cafcc5a8fdde88e7fb4db063fabc53d78918aaaf20dfe42eef1e48634baca69dd56fea98351c4feb400e33a62de8328a90e332083a63a6e3e2e8650d455f274ff78f697e62b05c5bf63d4ac8d35e53e5c1a2dfc110804620c802a85a525dc47afbe7ad06d4a0f8d273f5a6f267150c191fd96fe9ace8fb56f41cfb7bcabe27f4bcd758163c3d08e69bfffc14865881ca151cd7c0925e54ef99b4d7cc1b3e4326ca81d40800000000000000ba58100e442a10fd3c02f074c0297bb1f86bf0491a2b89dc541e034d39efc5fa85c59668303d86589634ce834ec849be1a1fe549c19f740d6cf1dd36782fa2f3a43ccdd12c3c566c3523ca8d7cc0f27a0b0a223fb9c360a7a186cc8be1e16b0657ee6a2d9dffe5745533", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) 03:37:30 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="b77aa0c6be9f2a06fcd1ddbce5cfbb07a954d6096b54bc90706d0121942014015779d24f2fd71085cafcc5a8fdde88e7fb4db063fabc53d78918aaaf20dfe42eef1e48634baca69dd56fea98351c4feb400e33a62de8328a90e332083a63a6e3e2e8650d455f274ff78f697e62b05c5bf63d4ac8d35e53e5c1a2dfc110804620c802a85a525dc47afbe7ad06d4a0f8d273f5a6f267150c191fd96fe9ace8fb56f41cfb7bcabe27f4bcd758163c3d08e69bfffc14865881ca151cd7c0925e54ef99b4d7cc1b3e4326ca81d40800000000000000ba58100e442a10fd3c02f074c0297bb1f86bf0491a2b89dc541e034d39efc5fa85c59668303d86589634ce834ec849be1a1fe549c19f740d6cf1dd36782fa2f3a43ccdd12c3c566c3523ca8d7cc0f27a0b0a223fb9c360a7a186cc8be1e16b0657ee6a2d9dffe5745533", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) 03:37:30 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="b77aa0c6be9f2a06fcd1ddbce5cfbb07a954d6096b54bc90706d0121942014015779d24f2fd71085cafcc5a8fdde88e7fb4db063fabc53d78918aaaf20dfe42eef1e48634baca69dd56fea98351c4feb400e33a62de8328a90e332083a63a6e3e2e8650d455f274ff78f697e62b05c5bf63d4ac8d35e53e5c1a2dfc110804620c802a85a525dc47afbe7ad06d4a0f8d273f5a6f267150c191fd96fe9ace8fb56f41cfb7bcabe27f4bcd758163c3d08e69bfffc14865881ca151cd7c0925e54ef99b4d7cc1b3e4326ca81d40800000000000000ba58100e442a10fd3c02f074c0297bb1f86bf0491a2b89dc541e034d39efc5fa85c59668303d86589634ce834ec849be1a1fe549c19f740d6cf1dd36782fa2f3a43ccdd12c3c566c3523ca8d7cc0f27a0b0a223fb9c360a7a186cc8be1e16b0657ee6a2d9dffe5745533", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) 03:37:30 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="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", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) 03:37:30 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="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", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) 03:37:30 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="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", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) 03:37:30 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="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", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) 03:37:30 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000000)={0x0, 0x300, 0x0, [], &(0x7f0000000040)={0x0, 0x0, [], @p_u32=0x0}}) 03:37:30 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="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", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) 03:37:30 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="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", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) 03:37:30 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/net\x00') socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x2) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000100)="b15991cd80696852ef694b00d946f91cc10f788e00800000665b0f3862315868f4a95ff9400f78f68f4808eebce00000802000d4c48192558dc3c36645660ff6e9660d3a128f000000767c7cca4f730747da731f071f075fc4027db8d5646736676666430fefb3000000040804f4f30f1a12548fe97882ec") 03:37:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) lstat(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='lp\x00', 0x2ca) ioctl$int_out(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x500, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/20, 0x14}, {&(0x7f00000018c0)=""/4096, 0x1000}, {&(0x7f0000000080)=""/16, 0x10}, {&(0x7f0000000140)=""/107, 0x6b}], 0x4, &(0x7f00000001c0)=""/65, 0x41}, 0x78}], 0x1, 0x2000, &(0x7f0000000280)={0x0, 0x1c9c380}) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) select(0xfffffffffffffecb, 0x0, 0x0, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0x72516111, 0x100, &(0x7f0000001880), 0xffffff97) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000300)=""/37) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r1, &(0x7f00000008c0)='/', 0x1, 0x0, 0x0, 0x0) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") 03:37:30 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="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", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) [ 375.466861] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:37:30 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="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", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) 03:37:30 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000000)={0x0, 0x300, 0x0, [], &(0x7f0000000040)={0x0, 0x0, [], @p_u32=0x0}}) 03:37:30 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/net\x00') socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x2) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000100)="b15991cd80696852ef694b00d946f91cc10f788e00800000665b0f3862315868f4a95ff9400f78f68f4808eebce00000802000d4c48192558dc3c36645660ff6e9660d3a128f000000767c7cca4f730747da731f071f075fc4027db8d5646736676666430fefb3000000040804f4f30f1a12548fe97882ec") 03:37:31 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40200, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0xd0043, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffc000/0x2000)=nil, 0x7fff, 0x0, 0x8, &(0x7f0000ffc000/0x4000)=nil}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) epoll_create(0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='cifs.idmap\x00', 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000a00)="b77aa0c6be9f2a06fcd1ddbce5cfbb07a954d6096b54bc90706d0121942014015779d24f2fd71085cafcc5a8fdde88e7fb4db063fabc53d78918aaaf20dfe42eef1e48634baca69dd56fea98351c4feb400e33a62de8328a90e332083a63a6e3e2e8650d455f274ff78f697e62b05c5bf63d4ac8d35e53e5c1a2dfc110804620c802a85a525dc47afbe7ad06d4a0f8d273f5a6f267150c191fd96fe9ace8fb56f41cfb7bcabe27f4bcd758163c3d08e69bfffc14865881ca151cd7c0925e54ef99b4d7cc1b3e4326ca81d40800000000000000ba58100e442a10fd3c02f074c0297bb1f86bf0491a2b89dc541e034d39efc5fa85c59668303d86589634ce834ec849be1a1fe549c19f740d6cf1dd36782fa2f3a43ccdd12c3c566c3523ca8d7cc0f27a0b0a223fb9c360a7a186cc8be1e16b0657ee6a2d9dffe5745533", 0xfffffffffffffffe}, 0x18) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000000000000000, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0xd1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84}, 0x800000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x8) ioctl$UI_DEV_DESTROY(r2, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, 0x2, 0x9}) r3 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000380)={0x6, &(0x7f0000000b40)=[{}, {}, {}, {}, {}, {}]}) prctl$PR_SVE_SET_VL(0x32, 0x12006) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) sendmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x7f}) 03:37:31 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000000)={0x0, 0x300, 0x0, [], &(0x7f0000000040)={0x0, 0x0, [], @p_u32=0x0}}) 03:37:31 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/net\x00') socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x2) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000100)="b15991cd80696852ef694b00d946f91cc10f788e00800000665b0f3862315868f4a95ff9400f78f68f4808eebce00000802000d4c48192558dc3c36645660ff6e9660d3a128f000000767c7cca4f730747da731f071f075fc4027db8d5646736676666430fefb3000000040804f4f30f1a12548fe97882ec") 03:37:31 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/net\x00') socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x2) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000100)="b15991cd80696852ef694b00d946f91cc10f788e00800000665b0f3862315868f4a95ff9400f78f68f4808eebce00000802000d4c48192558dc3c36645660ff6e9660d3a128f000000767c7cca4f730747da731f071f075fc4027db8d5646736676666430fefb3000000040804f4f30f1a12548fe97882ec") 03:37:31 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000000)={0x0, 0x300, 0x0, [], &(0x7f0000000040)={0x0, 0x0, [], @p_u32=0x0}}) 03:37:31 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/net\x00') socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x2) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000100)="b15991cd80696852ef694b00d946f91cc10f788e00800000665b0f3862315868f4a95ff9400f78f68f4808eebce00000802000d4c48192558dc3c36645660ff6e9660d3a128f000000767c7cca4f730747da731f071f075fc4027db8d5646736676666430fefb3000000040804f4f30f1a12548fe97882ec") 03:37:31 executing program 0: clone(0x0, &(0x7f0000000040), 0x0, 0x0, 0x0) waitid(0x0, 0x0, &(0x7f0000002ff0), 0x4100000c, 0x0) 03:37:31 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/net\x00') socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x2) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000100)="b15991cd80696852ef694b00d946f91cc10f788e00800000665b0f3862315868f4a95ff9400f78f68f4808eebce00000802000d4c48192558dc3c36645660ff6e9660d3a128f000000767c7cca4f730747da731f071f075fc4027db8d5646736676666430fefb3000000040804f4f30f1a12548fe97882ec") 03:37:31 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/net\x00') socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x2) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000100)="b15991cd80696852ef694b00d946f91cc10f788e00800000665b0f3862315868f4a95ff9400f78f68f4808eebce00000802000d4c48192558dc3c36645660ff6e9660d3a128f000000767c7cca4f730747da731f071f075fc4027db8d5646736676666430fefb3000000040804f4f30f1a12548fe97882ec") 03:37:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r1, 0xc0104307, 0x0) 03:37:31 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/net\x00') socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x2) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000100)="b15991cd80696852ef694b00d946f91cc10f788e00800000665b0f3862315868f4a95ff9400f78f68f4808eebce00000802000d4c48192558dc3c36645660ff6e9660d3a128f000000767c7cca4f730747da731f071f075fc4027db8d5646736676666430fefb3000000040804f4f30f1a12548fe97882ec") 03:37:31 executing program 0: clone(0x0, &(0x7f0000000040), 0x0, 0x0, 0x0) waitid(0x0, 0x0, &(0x7f0000002ff0), 0x4100000c, 0x0) 03:37:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) lstat(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='lp\x00', 0x2ca) ioctl$int_out(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x500, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/20, 0x14}, {&(0x7f00000018c0)=""/4096, 0x1000}, {&(0x7f0000000080)=""/16, 0x10}, {&(0x7f0000000140)=""/107, 0x6b}], 0x4, &(0x7f00000001c0)=""/65, 0x41}, 0x78}], 0x1, 0x2000, &(0x7f0000000280)={0x0, 0x1c9c380}) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) select(0xfffffffffffffecb, 0x0, 0x0, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0x72516111, 0x100, &(0x7f0000001880), 0xffffff97) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000300)=""/37) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r1, &(0x7f00000008c0)='/', 0x1, 0x0, 0x0, 0x0) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") 03:37:31 executing program 0: clone(0x0, &(0x7f0000000040), 0x0, 0x0, 0x0) waitid(0x0, 0x0, &(0x7f0000002ff0), 0x4100000c, 0x0) 03:37:31 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/net\x00') socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x2) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000100)="b15991cd80696852ef694b00d946f91cc10f788e00800000665b0f3862315868f4a95ff9400f78f68f4808eebce00000802000d4c48192558dc3c36645660ff6e9660d3a128f000000767c7cca4f730747da731f071f075fc4027db8d5646736676666430fefb3000000040804f4f30f1a12548fe97882ec") 03:37:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r1, 0xc0104307, 0x0) [ 376.329829] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:37:31 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/net\x00') socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x2) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000100)="b15991cd80696852ef694b00d946f91cc10f788e00800000665b0f3862315868f4a95ff9400f78f68f4808eebce00000802000d4c48192558dc3c36645660ff6e9660d3a128f000000767c7cca4f730747da731f071f075fc4027db8d5646736676666430fefb3000000040804f4f30f1a12548fe97882ec") 03:37:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) lstat(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='lp\x00', 0x2ca) ioctl$int_out(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x500, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/20, 0x14}, {&(0x7f00000018c0)=""/4096, 0x1000}, {&(0x7f0000000080)=""/16, 0x10}, {&(0x7f0000000140)=""/107, 0x6b}], 0x4, &(0x7f00000001c0)=""/65, 0x41}, 0x78}], 0x1, 0x2000, &(0x7f0000000280)={0x0, 0x1c9c380}) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) select(0xfffffffffffffecb, 0x0, 0x0, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0x72516111, 0x100, &(0x7f0000001880), 0xffffff97) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000300)=""/37) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r1, &(0x7f00000008c0)='/', 0x1, 0x0, 0x0, 0x0) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") 03:37:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r1, 0xc0104307, 0x0) 03:37:31 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) lstat(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='lp\x00', 0x2ca) ioctl$int_out(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x500, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/20, 0x14}, {&(0x7f00000018c0)=""/4096, 0x1000}, {&(0x7f0000000080)=""/16, 0x10}, {&(0x7f0000000140)=""/107, 0x6b}], 0x4, &(0x7f00000001c0)=""/65, 0x41}, 0x78}], 0x1, 0x2000, &(0x7f0000000280)={0x0, 0x1c9c380}) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) select(0xfffffffffffffecb, 0x0, 0x0, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0x72516111, 0x100, &(0x7f0000001880), 0xffffff97) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000300)=""/37) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r1, &(0x7f00000008c0)='/', 0x1, 0x0, 0x0, 0x0) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") [ 376.522988] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:37:31 executing program 0: clone(0x0, &(0x7f0000000040), 0x0, 0x0, 0x0) waitid(0x0, 0x0, &(0x7f0000002ff0), 0x4100000c, 0x0) 03:37:32 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) lstat(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='lp\x00', 0x2ca) ioctl$int_out(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x500, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/20, 0x14}, {&(0x7f00000018c0)=""/4096, 0x1000}, {&(0x7f0000000080)=""/16, 0x10}, {&(0x7f0000000140)=""/107, 0x6b}], 0x4, &(0x7f00000001c0)=""/65, 0x41}, 0x78}], 0x1, 0x2000, &(0x7f0000000280)={0x0, 0x1c9c380}) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) select(0xfffffffffffffecb, 0x0, 0x0, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0x72516111, 0x100, &(0x7f0000001880), 0xffffff97) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000300)=""/37) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r1, &(0x7f00000008c0)='/', 0x1, 0x0, 0x0, 0x0) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") 03:37:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r1, 0xc0104307, 0x0) [ 376.642058] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:37:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) lstat(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='lp\x00', 0x2ca) ioctl$int_out(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x500, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/20, 0x14}, {&(0x7f00000018c0)=""/4096, 0x1000}, {&(0x7f0000000080)=""/16, 0x10}, {&(0x7f0000000140)=""/107, 0x6b}], 0x4, &(0x7f00000001c0)=""/65, 0x41}, 0x78}], 0x1, 0x2000, &(0x7f0000000280)={0x0, 0x1c9c380}) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) select(0xfffffffffffffecb, 0x0, 0x0, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0x72516111, 0x100, &(0x7f0000001880), 0xffffff97) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000300)=""/37) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r1, &(0x7f00000008c0)='/', 0x1, 0x0, 0x0, 0x0) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") [ 376.726833] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 376.824879] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:37:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) lstat(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='lp\x00', 0x2ca) ioctl$int_out(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x500, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/20, 0x14}, {&(0x7f00000018c0)=""/4096, 0x1000}, {&(0x7f0000000080)=""/16, 0x10}, {&(0x7f0000000140)=""/107, 0x6b}], 0x4, &(0x7f00000001c0)=""/65, 0x41}, 0x78}], 0x1, 0x2000, &(0x7f0000000280)={0x0, 0x1c9c380}) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) select(0xfffffffffffffecb, 0x0, 0x0, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0x72516111, 0x100, &(0x7f0000001880), 0xffffff97) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000300)=""/37) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r1, &(0x7f00000008c0)='/', 0x1, 0x0, 0x0, 0x0) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") 03:37:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) lstat(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='lp\x00', 0x2ca) ioctl$int_out(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x500, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/20, 0x14}, {&(0x7f00000018c0)=""/4096, 0x1000}, {&(0x7f0000000080)=""/16, 0x10}, {&(0x7f0000000140)=""/107, 0x6b}], 0x4, &(0x7f00000001c0)=""/65, 0x41}, 0x78}], 0x1, 0x2000, &(0x7f0000000280)={0x0, 0x1c9c380}) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) select(0xfffffffffffffecb, 0x0, 0x0, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0x72516111, 0x100, &(0x7f0000001880), 0xffffff97) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000300)=""/37) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r1, &(0x7f00000008c0)='/', 0x1, 0x0, 0x0, 0x0) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") 03:37:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) lstat(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='lp\x00', 0x2ca) ioctl$int_out(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x500, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/20, 0x14}, {&(0x7f00000018c0)=""/4096, 0x1000}, {&(0x7f0000000080)=""/16, 0x10}, {&(0x7f0000000140)=""/107, 0x6b}], 0x4, &(0x7f00000001c0)=""/65, 0x41}, 0x78}], 0x1, 0x2000, &(0x7f0000000280)={0x0, 0x1c9c380}) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) select(0xfffffffffffffecb, 0x0, 0x0, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0x72516111, 0x100, &(0x7f0000001880), 0xffffff97) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000300)=""/37) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r1, &(0x7f00000008c0)='/', 0x1, 0x0, 0x0, 0x0) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") [ 377.224735] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 377.254261] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 377.257979] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:37:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) lstat(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='lp\x00', 0x2ca) ioctl$int_out(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x500, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/20, 0x14}, {&(0x7f00000018c0)=""/4096, 0x1000}, {&(0x7f0000000080)=""/16, 0x10}, {&(0x7f0000000140)=""/107, 0x6b}], 0x4, &(0x7f00000001c0)=""/65, 0x41}, 0x78}], 0x1, 0x2000, &(0x7f0000000280)={0x0, 0x1c9c380}) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) select(0xfffffffffffffecb, 0x0, 0x0, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0x72516111, 0x100, &(0x7f0000001880), 0xffffff97) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000300)=""/37) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r1, &(0x7f00000008c0)='/', 0x1, 0x0, 0x0, 0x0) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") [ 377.380871] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:37:32 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) lstat(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='lp\x00', 0x2ca) ioctl$int_out(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x500, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/20, 0x14}, {&(0x7f00000018c0)=""/4096, 0x1000}, {&(0x7f0000000080)=""/16, 0x10}, {&(0x7f0000000140)=""/107, 0x6b}], 0x4, &(0x7f00000001c0)=""/65, 0x41}, 0x78}], 0x1, 0x2000, &(0x7f0000000280)={0x0, 0x1c9c380}) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) select(0xfffffffffffffecb, 0x0, 0x0, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0x72516111, 0x100, &(0x7f0000001880), 0xffffff97) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000300)=""/37) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r1, &(0x7f00000008c0)='/', 0x1, 0x0, 0x0, 0x0) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") 03:37:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) lstat(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='lp\x00', 0x2ca) ioctl$int_out(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x500, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/20, 0x14}, {&(0x7f00000018c0)=""/4096, 0x1000}, {&(0x7f0000000080)=""/16, 0x10}, {&(0x7f0000000140)=""/107, 0x6b}], 0x4, &(0x7f00000001c0)=""/65, 0x41}, 0x78}], 0x1, 0x2000, &(0x7f0000000280)={0x0, 0x1c9c380}) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) select(0xfffffffffffffecb, 0x0, 0x0, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0x72516111, 0x100, &(0x7f0000001880), 0xffffff97) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000300)=""/37) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r1, &(0x7f00000008c0)='/', 0x1, 0x0, 0x0, 0x0) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") [ 377.593655] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 377.736946] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:37:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) lstat(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='lp\x00', 0x2ca) ioctl$int_out(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x500, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/20, 0x14}, {&(0x7f00000018c0)=""/4096, 0x1000}, {&(0x7f0000000080)=""/16, 0x10}, {&(0x7f0000000140)=""/107, 0x6b}], 0x4, &(0x7f00000001c0)=""/65, 0x41}, 0x78}], 0x1, 0x2000, &(0x7f0000000280)={0x0, 0x1c9c380}) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) select(0xfffffffffffffecb, 0x0, 0x0, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0x72516111, 0x100, &(0x7f0000001880), 0xffffff97) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000300)=""/37) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r1, &(0x7f00000008c0)='/', 0x1, 0x0, 0x0, 0x0) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") 03:37:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) lstat(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='lp\x00', 0x2ca) ioctl$int_out(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x500, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/20, 0x14}, {&(0x7f00000018c0)=""/4096, 0x1000}, {&(0x7f0000000080)=""/16, 0x10}, {&(0x7f0000000140)=""/107, 0x6b}], 0x4, &(0x7f00000001c0)=""/65, 0x41}, 0x78}], 0x1, 0x2000, &(0x7f0000000280)={0x0, 0x1c9c380}) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) select(0xfffffffffffffecb, 0x0, 0x0, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0x72516111, 0x100, &(0x7f0000001880), 0xffffff97) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000300)=""/37) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r1, &(0x7f00000008c0)='/', 0x1, 0x0, 0x0, 0x0) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") 03:37:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) lstat(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='lp\x00', 0x2ca) ioctl$int_out(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x500, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/20, 0x14}, {&(0x7f00000018c0)=""/4096, 0x1000}, {&(0x7f0000000080)=""/16, 0x10}, {&(0x7f0000000140)=""/107, 0x6b}], 0x4, &(0x7f00000001c0)=""/65, 0x41}, 0x78}], 0x1, 0x2000, &(0x7f0000000280)={0x0, 0x1c9c380}) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) select(0xfffffffffffffecb, 0x0, 0x0, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0x72516111, 0x100, &(0x7f0000001880), 0xffffff97) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000300)=""/37) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r1, &(0x7f00000008c0)='/', 0x1, 0x0, 0x0, 0x0) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") [ 378.075142] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:37:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) lstat(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='lp\x00', 0x2ca) ioctl$int_out(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x500, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/20, 0x14}, {&(0x7f00000018c0)=""/4096, 0x1000}, {&(0x7f0000000080)=""/16, 0x10}, {&(0x7f0000000140)=""/107, 0x6b}], 0x4, &(0x7f00000001c0)=""/65, 0x41}, 0x78}], 0x1, 0x2000, &(0x7f0000000280)={0x0, 0x1c9c380}) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) select(0xfffffffffffffecb, 0x0, 0x0, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0x72516111, 0x100, &(0x7f0000001880), 0xffffff97) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000300)=""/37) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r1, &(0x7f00000008c0)='/', 0x1, 0x0, 0x0, 0x0) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") [ 378.138743] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 378.154100] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 378.261760] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:37:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) lstat(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='lp\x00', 0x2ca) ioctl$int_out(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x500, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/20, 0x14}, {&(0x7f00000018c0)=""/4096, 0x1000}, {&(0x7f0000000080)=""/16, 0x10}, {&(0x7f0000000140)=""/107, 0x6b}], 0x4, &(0x7f00000001c0)=""/65, 0x41}, 0x78}], 0x1, 0x2000, &(0x7f0000000280)={0x0, 0x1c9c380}) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) select(0xfffffffffffffecb, 0x0, 0x0, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0x72516111, 0x100, &(0x7f0000001880), 0xffffff97) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000300)=""/37) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r1, &(0x7f00000008c0)='/', 0x1, 0x0, 0x0, 0x0) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") [ 378.540695] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:37:33 executing program 2: clone(0x0, &(0x7f0000000040), 0x0, 0x0, 0x0) waitid(0x0, 0x0, &(0x7f0000002ff0), 0x4100000c, 0x0) 03:37:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) lstat(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='lp\x00', 0x2ca) ioctl$int_out(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x500, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/20, 0x14}, {&(0x7f00000018c0)=""/4096, 0x1000}, {&(0x7f0000000080)=""/16, 0x10}, {&(0x7f0000000140)=""/107, 0x6b}], 0x4, &(0x7f00000001c0)=""/65, 0x41}, 0x78}], 0x1, 0x2000, &(0x7f0000000280)={0x0, 0x1c9c380}) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) select(0xfffffffffffffecb, 0x0, 0x0, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0x72516111, 0x100, &(0x7f0000001880), 0xffffff97) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000300)=""/37) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r1, &(0x7f00000008c0)='/', 0x1, 0x0, 0x0, 0x0) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") 03:37:34 executing program 2: clone(0x0, &(0x7f0000000040), 0x0, 0x0, 0x0) waitid(0x0, 0x0, &(0x7f0000002ff0), 0x4100000c, 0x0) [ 378.685934] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:37:34 executing program 2: clone(0x0, &(0x7f0000000040), 0x0, 0x0, 0x0) waitid(0x0, 0x0, &(0x7f0000002ff0), 0x4100000c, 0x0) 03:37:34 executing program 1: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x803, 0x0) 03:37:34 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) lstat(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='lp\x00', 0x2ca) ioctl$int_out(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x500, 0x0) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/20, 0x14}, {&(0x7f00000018c0)=""/4096, 0x1000}, {&(0x7f0000000080)=""/16, 0x10}, {&(0x7f0000000140)=""/107, 0x6b}], 0x4, &(0x7f00000001c0)=""/65, 0x41}, 0x78}], 0x1, 0x2000, &(0x7f0000000280)={0x0, 0x1c9c380}) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) select(0xfffffffffffffecb, 0x0, 0x0, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0x72516111, 0x100, &(0x7f0000001880), 0xffffff97) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000300)=""/37) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r1, &(0x7f00000008c0)='/', 0x1, 0x0, 0x0, 0x0) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") 03:37:34 executing program 1: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x803, 0x0) 03:37:34 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&\xdbA\x1bn\xbcSv\x91->y\xfe\xfa\xfb/\x18g\x80y\xfe\x89\xab\x0e\xab\xac\b\'\xcd', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) 03:37:34 executing program 1: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x803, 0x0) 03:37:34 executing program 3: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x0, 0x0) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) write$P9_RFSYNC(r1, &(0x7f0000000100)={0x7}, 0x7) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) [ 379.084665] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:37:34 executing program 1: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x803, 0x0) 03:37:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x407ffffffa}]}) seccomp(0x0, 0x0, 0x0) 03:37:34 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) listen(r0, 0x0) 03:37:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x407ffffffa}]}) seccomp(0x0, 0x0, 0x0) 03:37:34 executing program 3: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x0, 0x0) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) write$P9_RFSYNC(r1, &(0x7f0000000100)={0x7}, 0x7) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) 03:37:34 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) listen(r0, 0x0) 03:37:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x407ffffffa}]}) seccomp(0x0, 0x0, 0x0) 03:37:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x407ffffffa}]}) seccomp(0x0, 0x0, 0x0) 03:37:35 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) listen(r0, 0x0) 03:37:35 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&\xdbA\x1bn\xbcSv\x91->y\xfe\xfa\xfb/\x18g\x80y\xfe\x89\xab\x0e\xab\xac\b\'\xcd', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) 03:37:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x407ffffffa}]}) seccomp(0x0, 0x0, 0x0) 03:37:35 executing program 3: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x0, 0x0) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) write$P9_RFSYNC(r1, &(0x7f0000000100)={0x7}, 0x7) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) 03:37:35 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) listen(r0, 0x0) 03:37:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x407ffffffa}]}) seccomp(0x0, 0x0, 0x0) 03:37:35 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) listen(r0, 0x0) 03:37:35 executing program 3: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x0, 0x0) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) write$P9_RFSYNC(r1, &(0x7f0000000100)={0x7}, 0x7) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) 03:37:35 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) listen(r0, 0x0) 03:37:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x407ffffffa}]}) seccomp(0x0, 0x0, 0x0) 03:37:35 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&\xdbA\x1bn\xbcSv\x91->y\xfe\xfa\xfb/\x18g\x80y\xfe\x89\xab\x0e\xab\xac\b\'\xcd', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) 03:37:35 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&\xdbA\x1bn\xbcSv\x91->y\xfe\xfa\xfb/\x18g\x80y\xfe\x89\xab\x0e\xab\xac\b\'\xcd', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) 03:37:35 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) listen(r0, 0x0) 03:37:36 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&\xdbA\x1bn\xbcSv\x91->y\xfe\xfa\xfb/\x18g\x80y\xfe\x89\xab\x0e\xab\xac\b\'\xcd', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) 03:37:36 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&\xdbA\x1bn\xbcSv\x91->y\xfe\xfa\xfb/\x18g\x80y\xfe\x89\xab\x0e\xab\xac\b\'\xcd', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) 03:37:36 executing program 5: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x0, 0x0) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) write$P9_RFSYNC(r1, &(0x7f0000000100)={0x7}, 0x7) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) 03:37:36 executing program 3: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x0, 0x0) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) write$P9_RFSYNC(r1, &(0x7f0000000100)={0x7}, 0x7) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) 03:37:36 executing program 3: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x0, 0x0) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) write$P9_RFSYNC(r1, &(0x7f0000000100)={0x7}, 0x7) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) 03:37:36 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&\xdbA\x1bn\xbcSv\x91->y\xfe\xfa\xfb/\x18g\x80y\xfe\x89\xab\x0e\xab\xac\b\'\xcd', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) 03:37:36 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&\xdbA\x1bn\xbcSv\x91->y\xfe\xfa\xfb/\x18g\x80y\xfe\x89\xab\x0e\xab\xac\b\'\xcd', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) 03:37:36 executing program 3: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x0, 0x0) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) write$P9_RFSYNC(r1, &(0x7f0000000100)={0x7}, 0x7) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) 03:37:36 executing program 5: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x0, 0x0) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) write$P9_RFSYNC(r1, &(0x7f0000000100)={0x7}, 0x7) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) 03:37:36 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$kcm(0x29, 0x5, 0x0) syz_execute_func(&(0x7f0000000180)="1c13b5b598cd801b69e4f56962f5696200d9d9d017795bf9f2680c0000008fe9589b26c7e4c753fbc4e101edfec4427d82663ed107c4c2b90a23f2168f4808eebce00000802000c422b18cb6070000005151c4a27d181ec1ea01ef7265dc5f00c35b5b304545e269a8419966030faee42c240f54635bdef2460f5e6061a1e1e0ef26400f0d18c401fe5ff6e30fad6736660fd2938c000000c4c1f913376666450f17720d2e440fc7bf0d000080450fa8") 03:37:36 executing program 5: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = syz_open_dev$usbmon(0x0, 0x0, 0x0) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) write$P9_RFSYNC(r1, &(0x7f0000000100)={0x7}, 0x7) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) 03:37:36 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$kcm(0x29, 0x5, 0x0) syz_execute_func(&(0x7f0000000180)="1c13b5b598cd801b69e4f56962f5696200d9d9d017795bf9f2680c0000008fe9589b26c7e4c753fbc4e101edfec4427d82663ed107c4c2b90a23f2168f4808eebce00000802000c422b18cb6070000005151c4a27d181ec1ea01ef7265dc5f00c35b5b304545e269a8419966030faee42c240f54635bdef2460f5e6061a1e1e0ef26400f0d18c401fe5ff6e30fad6736660fd2938c000000c4c1f913376666450f17720d2e440fc7bf0d000080450fa8") 03:37:36 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&\xdbA\x1bn\xbcSv\x91->y\xfe\xfa\xfb/\x18g\x80y\xfe\x89\xab\x0e\xab\xac\b\'\xcd', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) 03:37:36 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$kcm(0x29, 0x5, 0x0) syz_execute_func(&(0x7f0000000180)="1c13b5b598cd801b69e4f56962f5696200d9d9d017795bf9f2680c0000008fe9589b26c7e4c753fbc4e101edfec4427d82663ed107c4c2b90a23f2168f4808eebce00000802000c422b18cb6070000005151c4a27d181ec1ea01ef7265dc5f00c35b5b304545e269a8419966030faee42c240f54635bdef2460f5e6061a1e1e0ef26400f0d18c401fe5ff6e30fad6736660fd2938c000000c4c1f913376666450f17720d2e440fc7bf0d000080450fa8") 03:37:36 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$kcm(0x29, 0x5, 0x0) syz_execute_func(&(0x7f0000000180)="1c13b5b598cd801b69e4f56962f5696200d9d9d017795bf9f2680c0000008fe9589b26c7e4c753fbc4e101edfec4427d82663ed107c4c2b90a23f2168f4808eebce00000802000c422b18cb6070000005151c4a27d181ec1ea01ef7265dc5f00c35b5b304545e269a8419966030faee42c240f54635bdef2460f5e6061a1e1e0ef26400f0d18c401fe5ff6e30fad6736660fd2938c000000c4c1f913376666450f17720d2e440fc7bf0d000080450fa8") 03:37:36 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&\xdbA\x1bn\xbcSv\x91->y\xfe\xfa\xfb/\x18g\x80y\xfe\x89\xab\x0e\xab\xac\b\'\xcd', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) 03:37:37 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$kcm(0x29, 0x5, 0x0) syz_execute_func(&(0x7f0000000180)="1c13b5b598cd801b69e4f56962f5696200d9d9d017795bf9f2680c0000008fe9589b26c7e4c753fbc4e101edfec4427d82663ed107c4c2b90a23f2168f4808eebce00000802000c422b18cb6070000005151c4a27d181ec1ea01ef7265dc5f00c35b5b304545e269a8419966030faee42c240f54635bdef2460f5e6061a1e1e0ef26400f0d18c401fe5ff6e30fad6736660fd2938c000000c4c1f913376666450f17720d2e440fc7bf0d000080450fa8") 03:37:37 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&\xdbA\x1bn\xbcSv\x91->y\xfe\xfa\xfb/\x18g\x80y\xfe\x89\xab\x0e\xab\xac\b\'\xcd', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) 03:37:37 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$kcm(0x29, 0x5, 0x0) syz_execute_func(&(0x7f0000000180)="1c13b5b598cd801b69e4f56962f5696200d9d9d017795bf9f2680c0000008fe9589b26c7e4c753fbc4e101edfec4427d82663ed107c4c2b90a23f2168f4808eebce00000802000c422b18cb6070000005151c4a27d181ec1ea01ef7265dc5f00c35b5b304545e269a8419966030faee42c240f54635bdef2460f5e6061a1e1e0ef26400f0d18c401fe5ff6e30fad6736660fd2938c000000c4c1f913376666450f17720d2e440fc7bf0d000080450fa8") 03:37:37 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&\xdbA\x1bn\xbcSv\x91->y\xfe\xfa\xfb/\x18g\x80y\xfe\x89\xab\x0e\xab\xac\b\'\xcd', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) 03:37:37 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$kcm(0x29, 0x5, 0x0) syz_execute_func(&(0x7f0000000180)="1c13b5b598cd801b69e4f56962f5696200d9d9d017795bf9f2680c0000008fe9589b26c7e4c753fbc4e101edfec4427d82663ed107c4c2b90a23f2168f4808eebce00000802000c422b18cb6070000005151c4a27d181ec1ea01ef7265dc5f00c35b5b304545e269a8419966030faee42c240f54635bdef2460f5e6061a1e1e0ef26400f0d18c401fe5ff6e30fad6736660fd2938c000000c4c1f913376666450f17720d2e440fc7bf0d000080450fa8") 03:37:37 executing program 3: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setrlimit(0x4000000007, &(0x7f0000000140)) accept4(r0, 0x0, 0x0, 0x0) 03:37:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3ff, 0x110}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 03:37:37 executing program 3: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setrlimit(0x4000000007, &(0x7f0000000140)) accept4(r0, 0x0, 0x0, 0x0) 03:37:37 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&\xdbA\x1bn\xbcSv\x91->y\xfe\xfa\xfb/\x18g\x80y\xfe\x89\xab\x0e\xab\xac\b\'\xcd', 0x26e1, 0x0) close(r0) socketpair$tipc(0x1e, 0x801, 0x0, &(0x7f0000000000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r0) 03:37:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3ff, 0x110}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 03:37:37 executing program 3: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setrlimit(0x4000000007, &(0x7f0000000140)) accept4(r0, 0x0, 0x0, 0x0) 03:37:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3ff, 0x110}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 03:37:37 executing program 3: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setrlimit(0x4000000007, &(0x7f0000000140)) accept4(r0, 0x0, 0x0, 0x0) 03:37:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3ff, 0x110}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 03:37:38 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setrlimit(0x4000000007, &(0x7f0000000140)) accept4(r0, 0x0, 0x0, 0x0) 03:37:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3ff, 0x110}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 03:37:38 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setrlimit(0x4000000007, &(0x7f0000000140)) accept4(r0, 0x0, 0x0, 0x0) 03:37:38 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setrlimit(0x4000000007, &(0x7f0000000140)) accept4(r0, 0x0, 0x0, 0x0) 03:37:38 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d00)=@broute={'broute\x00', 0x20, 0x1, 0x188, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000280], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'tunl0\x00', 'team0\x00', 'syzkaller0\x00', @broadcast, [], @empty, [], 0x70, 0xc0, 0xf8}, [@common=@log={'log\x00', 0x28, {{0xb5a, "a123ba18677b00cac57d27fd8ff44710f8416e270c612ff7322f2bc1f783"}}}]}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x200) 03:37:38 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d00)=@broute={'broute\x00', 0x20, 0x1, 0x188, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000280], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'tunl0\x00', 'team0\x00', 'syzkaller0\x00', @broadcast, [], @empty, [], 0x70, 0xc0, 0xf8}, [@common=@log={'log\x00', 0x28, {{0xb5a, "a123ba18677b00cac57d27fd8ff44710f8416e270c612ff7322f2bc1f783"}}}]}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x200) 03:37:38 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d00)=@broute={'broute\x00', 0x20, 0x1, 0x188, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000280], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'tunl0\x00', 'team0\x00', 'syzkaller0\x00', @broadcast, [], @empty, [], 0x70, 0xc0, 0xf8}, [@common=@log={'log\x00', 0x28, {{0xb5a, "a123ba18677b00cac57d27fd8ff44710f8416e270c612ff7322f2bc1f783"}}}]}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x200) 03:37:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3ff, 0x110}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 03:37:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x5, 0x1}]}, &(0x7f0000000100)='GPL\x00'}, 0x48) 03:37:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3ff, 0x110}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 03:37:40 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000d00)=@broute={'broute\x00', 0x20, 0x1, 0x188, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000280], 0x0, 0x0, &(0x7f0000000280)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x0, 0x0, 'bcsh0\x00', 'tunl0\x00', 'team0\x00', 'syzkaller0\x00', @broadcast, [], @empty, [], 0x70, 0xc0, 0xf8}, [@common=@log={'log\x00', 0x28, {{0xb5a, "a123ba18677b00cac57d27fd8ff44710f8416e270c612ff7322f2bc1f783"}}}]}, @common=@mark={'mark\x00', 0x10}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}]}, 0x200) 03:37:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3ff, 0x110}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 03:37:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x5, 0x1}]}, &(0x7f0000000100)='GPL\x00'}, 0x48) 03:37:41 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000240)) 03:37:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3ff, 0x110}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 03:37:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x5, 0x1}]}, &(0x7f0000000100)='GPL\x00'}, 0x48) 03:37:41 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000240)) 03:37:41 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000240)) 03:37:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x5, 0x1}]}, &(0x7f0000000100)='GPL\x00'}, 0x48) 03:37:43 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000240)) 03:37:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3ff, 0x110}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 03:37:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3ff, 0x110}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 03:37:43 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000240)) 03:37:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3ff, 0x110}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 03:37:44 executing program 4: semop(0x0, &(0x7f0000000140)=[{0x0, 0xfffffffffffefff8}], 0x1) r0 = gettid() timer_create(0x0, &(0x7f0000000280)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000180)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) 03:37:44 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000240)) 03:37:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3ff, 0x110}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 03:37:44 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000240)) 03:37:44 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0_to_bond\x00', &(0x7f0000000040)=@ethtool_cmd={0x26, 0x100}}) 03:37:44 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0_to_bond\x00', &(0x7f0000000040)=@ethtool_cmd={0x26, 0x100}}) 03:37:44 executing program 4: semop(0x0, &(0x7f0000000140)=[{0x0, 0xfffffffffffefff8}], 0x1) r0 = gettid() timer_create(0x0, &(0x7f0000000280)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000180)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) 03:37:44 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0_to_bond\x00', &(0x7f0000000040)=@ethtool_cmd={0x26, 0x100}}) 03:37:46 executing program 4: semop(0x0, &(0x7f0000000140)=[{0x0, 0xfffffffffffefff8}], 0x1) r0 = gettid() timer_create(0x0, &(0x7f0000000280)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000180)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) 03:37:46 executing program 5: semop(0x0, &(0x7f0000000140)=[{0x0, 0xfffffffffffefff8}], 0x1) r0 = gettid() timer_create(0x0, &(0x7f0000000280)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000180)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) 03:37:46 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth0_to_bond\x00', &(0x7f0000000040)=@ethtool_cmd={0x26, 0x100}}) 03:37:47 executing program 5: semop(0x0, &(0x7f0000000140)=[{0x0, 0xfffffffffffefff8}], 0x1) r0 = gettid() timer_create(0x0, &(0x7f0000000280)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000180)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) 03:37:47 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7d9288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000001440)="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", 0x290}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008cc0)=[{{0x0, 0xfffffffffffffe06, &(0x7f0000003a40)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1, 0x0, 0x5c}}], 0x1, 0x0, 0x0) 03:37:47 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:47 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x800000c0045009, &(0x7f00000000c0)=0x4) 03:37:47 executing program 4: semop(0x0, &(0x7f0000000140)=[{0x0, 0xfffffffffffefff8}], 0x1) r0 = gettid() timer_create(0x0, &(0x7f0000000280)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000180)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) 03:37:47 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f00000000c0)="982cee0f050520d0f80791b06a4141e2e99643b299b9afc466a4c4660f0f01fc66f66d220f66450f73db0421fc22ebf3440fe645092e41812047002b00009b010149f6ba0dfe8c730c88b4b4d20fbbc4a201458b6a0000008f294001b00b05000073d539f08171a38a806ebb2ac4a0ebe691ae88136560043800004318bedfbecebedfbece00000055c4c26db6e4fb64400f38cd01362e420f65b900800000") clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="02"], 0x1}}, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f00000001c0)={0x0, 0xe89}) 03:37:47 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7d9288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000001440)="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", 0x290}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008cc0)=[{{0x0, 0xfffffffffffffe06, &(0x7f0000003a40)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1, 0x0, 0x5c}}], 0x1, 0x0, 0x0) [ 391.912674] bridge0: port 2(bridge_slave_1) entered disabled state [ 391.920425] bridge0: port 1(bridge_slave_0) entered disabled state 03:37:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7d9288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000001440)="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", 0x290}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008cc0)=[{{0x0, 0xfffffffffffffe06, &(0x7f0000003a40)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1, 0x0, 0x5c}}], 0x1, 0x0, 0x0) 03:37:47 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x800000c0045009, &(0x7f00000000c0)=0x4) 03:37:47 executing program 5: semop(0x0, &(0x7f0000000140)=[{0x0, 0xfffffffffffefff8}], 0x1) r0 = gettid() timer_create(0x0, &(0x7f0000000280)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000180)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) 03:37:47 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7d9288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000001440)="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", 0x290}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008cc0)=[{{0x0, 0xfffffffffffffe06, &(0x7f0000003a40)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1, 0x0, 0x5c}}], 0x1, 0x0, 0x0) [ 392.037915] device bridge_slave_1 left promiscuous mode [ 392.054515] bridge0: port 2(bridge_slave_1) entered disabled state 03:37:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7d9288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000001440)="c9f7e535b9be687ad1288ba55782de3d45e3bcd55bbd8c4847914b415fe4ef3dc90ffb983956a86e2bd5a62525c21a33d7d9c89eab8bd87024d69eb2b9e8efe67ba0ed67660d60184d98b31acb9496d34e10008b8a4ef1627797394b0111c393db8649a3a925abcc1e6ac1e46054d97d13cdacbdf2858bd6c3015ec3d6830bf0fd9a68afbb62f18c181169599c00cbf92fdd3df4c9dc2e72537954adc792030888a85e38682d6837b39a5841da13e3352299cc7017a5e042bc334b00cc10ed107cb97c2b0ef6f6ed770620db8d7fe0668fd6ea4725680e70800d1a480a9ef8d9cfc02403b8ed63d658c9cef30af92dc074328f1ad0f0a1e231e7017b89f492cfb1ea2dbb30b335f651f6e6ea33940d03e6173ec117eae95e87a3f9c96a1619a5e480712626fa0e24dbc33d4a071ebbd9b025bb3bd56ec1303a740aef2cc39d44a4d2524c32be831d617e0077acde9d1a608cb45b2fe908994c9278d24283440bf9439c4b173afaa50588c64a98b22114e2c7897a7053ba1f5a475b64a579b5d2c73e28552d9f0387042baab41bcdf2fd1959706953948813c830c54c8701eebfa85589b0c5e0068d6cba5221bb71b837a2cbaac891643d6603631117c037ab47e8e6ba8ef4e8fa1bf7580ac9a0e62e30f0d5e2307dd656129932ef9c716c21fa44336d9bce83bfcb03635302fc02fa78d40bd57f4ca3046dd5721806a694772208b2bcf45fe3655f28a4d7077c6c29c7d36db26d30d5cd56e88103dc10f63f63850e3361c6fc940f54be61d0dfc04010a4dcc7f2c0dce847adf6f7cb5b9c9acc32ca41ab04215681f2a188291e464d35b6629614396582fa543e76e9601fbc661246c26e1a9764dac2d837d05421c18aeeb618f708a383413650ca262e87f0ea23dd5fc2d119c2e5f4016c8027bfad8d", 0x290}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008cc0)=[{{0x0, 0xfffffffffffffe06, &(0x7f0000003a40)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1, 0x0, 0x5c}}], 0x1, 0x0, 0x0) 03:37:47 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x800000c0045009, &(0x7f00000000c0)=0x4) 03:37:47 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f00000000c0)="982cee0f050520d0f80791b06a4141e2e99643b299b9afc466a4c4660f0f01fc66f66d220f66450f73db0421fc22ebf3440fe645092e41812047002b00009b010149f6ba0dfe8c730c88b4b4d20fbbc4a201458b6a0000008f294001b00b05000073d539f08171a38a806ebb2ac4a0ebe691ae88136560043800004318bedfbecebedfbece00000055c4c26db6e4fb64400f38cd01362e420f65b900800000") clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="02"], 0x1}}, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f00000001c0)={0x0, 0xe89}) [ 392.158363] device bridge_slave_0 left promiscuous mode [ 392.190448] bridge0: port 1(bridge_slave_0) entered disabled state 03:37:47 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:47 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f00000000c0)="982cee0f050520d0f80791b06a4141e2e99643b299b9afc466a4c4660f0f01fc66f66d220f66450f73db0421fc22ebf3440fe645092e41812047002b00009b010149f6ba0dfe8c730c88b4b4d20fbbc4a201458b6a0000008f294001b00b05000073d539f08171a38a806ebb2ac4a0ebe691ae88136560043800004318bedfbecebedfbece00000055c4c26db6e4fb64400f38cd01362e420f65b900800000") clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="02"], 0x1}}, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f00000001c0)={0x0, 0xe89}) 03:37:47 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7d9288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000001440)="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", 0x290}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008cc0)=[{{0x0, 0xfffffffffffffe06, &(0x7f0000003a40)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1, 0x0, 0x5c}}], 0x1, 0x0, 0x0) 03:37:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7d9288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000001440)="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", 0x290}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008cc0)=[{{0x0, 0xfffffffffffffe06, &(0x7f0000003a40)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1, 0x0, 0x5c}}], 0x1, 0x0, 0x0) 03:37:47 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x800000c0045009, &(0x7f00000000c0)=0x4) 03:37:47 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f00000000c0)="982cee0f050520d0f80791b06a4141e2e99643b299b9afc466a4c4660f0f01fc66f66d220f66450f73db0421fc22ebf3440fe645092e41812047002b00009b010149f6ba0dfe8c730c88b4b4d20fbbc4a201458b6a0000008f294001b00b05000073d539f08171a38a806ebb2ac4a0ebe691ae88136560043800004318bedfbecebedfbece00000055c4c26db6e4fb64400f38cd01362e420f65b900800000") clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="02"], 0x1}}, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f00000001c0)={0x0, 0xe89}) 03:37:47 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:47 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:47 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="140000080003ffff00000000000000000000a5ce1577f94fe19a69cdb3d821197a1a4b18df3d104f02de27574925ab9b00009edc9d03d04aa27681c11d7e4ad11f6663adb19e4363a01d6d89ea93d8f4d4c622600a19efbc7001d7b81e1a36163d0aa2976d1f5e451bd076c662f7899066ece907362366ade6fddd2e955489b7d79d8a794b66231720ea812977a6a7812cf8a8de7d944fa2fe06b3e3863968a28d2a2347f119c48d239d6b28b7e148c64f26a16ca292fe8d4c212bef83570fbd76ab7a70fbe21a3030a387923610be630242153e0d6c43c5c12da515f654cf1327df9fff389b9b950359e03cc0fb18fc34afcce497c4fe5dc7edf8dbe1bbee594a0d1f000a416500a04e29de1a1f7727c77378345da8641a15e3717060a3ed7e4ea87279ddcf974cf069bbe86f7da3b84df6ac463bc254d9c5b85725195eb7a735b2e0b38bc2a7dffcb6f8cd85212f68dbc3ca7e66a23420ff00cae7f618c1220cd091c41b219d1d2d89ba5b53d73cebd0adaaeb0c44b8b817ea7f7c6647c12ec7bba289cc652ab8e9cde7b0edec124365d46c80fb2874834528c4675eff6866"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:47 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f00000000c0)="982cee0f050520d0f80791b06a4141e2e99643b299b9afc466a4c4660f0f01fc66f66d220f66450f73db0421fc22ebf3440fe645092e41812047002b00009b010149f6ba0dfe8c730c88b4b4d20fbbc4a201458b6a0000008f294001b00b05000073d539f08171a38a806ebb2ac4a0ebe691ae88136560043800004318bedfbecebedfbece00000055c4c26db6e4fb64400f38cd01362e420f65b900800000") clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="02"], 0x1}}, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f00000001c0)={0x0, 0xe89}) [ 392.591333] bridge0: port 2(bridge_slave_1) entered disabled state [ 392.599521] bridge0: port 1(bridge_slave_0) entered disabled state 03:37:48 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f00000000c0)="982cee0f050520d0f80791b06a4141e2e99643b299b9afc466a4c4660f0f01fc66f66d220f66450f73db0421fc22ebf3440fe645092e41812047002b00009b010149f6ba0dfe8c730c88b4b4d20fbbc4a201458b6a0000008f294001b00b05000073d539f08171a38a806ebb2ac4a0ebe691ae88136560043800004318bedfbecebedfbece00000055c4c26db6e4fb64400f38cd01362e420f65b900800000") clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="02"], 0x1}}, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f00000001c0)={0x0, 0xe89}) [ 392.671915] bridge0: port 2(bridge_slave_1) entered disabled state [ 392.679817] bridge0: port 1(bridge_slave_0) entered disabled state [ 392.788322] bridge0: port 2(bridge_slave_1) entered disabled state [ 392.796568] bridge0: port 1(bridge_slave_0) entered disabled state 03:37:48 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) [ 392.869569] device bridge_slave_1 left promiscuous mode [ 392.884235] bridge0: port 2(bridge_slave_1) entered disabled state [ 392.943589] device bridge_slave_0 left promiscuous mode [ 392.949315] bridge0: port 1(bridge_slave_0) entered disabled state 03:37:48 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:48 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f00000000c0)="982cee0f050520d0f80791b06a4141e2e99643b299b9afc466a4c4660f0f01fc66f66d220f66450f73db0421fc22ebf3440fe645092e41812047002b00009b010149f6ba0dfe8c730c88b4b4d20fbbc4a201458b6a0000008f294001b00b05000073d539f08171a38a806ebb2ac4a0ebe691ae88136560043800004318bedfbecebedfbece00000055c4c26db6e4fb64400f38cd01362e420f65b900800000") clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="02"], 0x1}}, 0x0) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f00000001c0)={0x0, 0xe89}) [ 393.019697] bridge0: port 2(bridge_slave_1) entered disabled state [ 393.027996] bridge0: port 1(bridge_slave_0) entered disabled state [ 393.091526] device bridge_slave_1 left promiscuous mode [ 393.110367] bridge0: port 2(bridge_slave_1) entered disabled state 03:37:48 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) [ 393.184143] device bridge_slave_0 left promiscuous mode [ 393.189743] bridge0: port 1(bridge_slave_0) entered disabled state 03:37:48 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) [ 393.276566] bridge0: port 2(bridge_slave_1) entered disabled state [ 393.284749] bridge0: port 1(bridge_slave_0) entered disabled state [ 393.323061] device bridge_slave_1 left promiscuous mode [ 393.340881] bridge0: port 2(bridge_slave_1) entered disabled state [ 393.391339] device bridge_slave_0 left promiscuous mode [ 393.397080] bridge0: port 1(bridge_slave_0) entered disabled state 03:37:48 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:48 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) [ 393.544965] device bridge_slave_1 left promiscuous mode [ 393.551150] bridge0: port 2(bridge_slave_1) entered disabled state [ 393.588357] device bridge_slave_0 left promiscuous mode [ 393.594629] bridge0: port 1(bridge_slave_0) entered disabled state [ 393.730455] device bridge_slave_1 left promiscuous mode [ 393.736599] bridge0: port 2(bridge_slave_1) entered disabled state [ 393.791088] device bridge_slave_0 left promiscuous mode [ 393.796747] bridge0: port 1(bridge_slave_0) entered disabled state 03:37:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="140000080003ffff00000000000000000000a5ce1577f94fe19a69cdb3d821197a1a4b18df3d104f02de27574925ab9b00009edc9d03d04aa27681c11d7e4ad11f6663adb19e4363a01d6d89ea93d8f4d4c622600a19efbc7001d7b81e1a36163d0aa2976d1f5e451bd076c662f7899066ece907362366ade6fddd2e955489b7d79d8a794b66231720ea812977a6a7812cf8a8de7d944fa2fe06b3e3863968a28d2a2347f119c48d239d6b28b7e148c64f26a16ca292fe8d4c212bef83570fbd76ab7a70fbe21a3030a387923610be630242153e0d6c43c5c12da515f654cf1327df9fff389b9b950359e03cc0fb18fc34afcce497c4fe5dc7edf8dbe1bbee594a0d1f000a416500a04e29de1a1f7727c77378345da8641a15e3717060a3ed7e4ea87279ddcf974cf069bbe86f7da3b84df6ac463bc254d9c5b85725195eb7a735b2e0b38bc2a7dffcb6f8cd85212f68dbc3ca7e66a23420ff00cae7f618c1220cd091c41b219d1d2d89ba5b53d73cebd0adaaeb0c44b8b817ea7f7c6647c12ec7bba289cc652ab8e9cde7b0edec124365d46c80fb2874834528c4675eff6866"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:49 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:49 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:49 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:49 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:49 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:49 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:49 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="140000080003ffff00000000000000000000a5ce1577f94fe19a69cdb3d821197a1a4b18df3d104f02de27574925ab9b00009edc9d03d04aa27681c11d7e4ad11f6663adb19e4363a01d6d89ea93d8f4d4c622600a19efbc7001d7b81e1a36163d0aa2976d1f5e451bd076c662f7899066ece907362366ade6fddd2e955489b7d79d8a794b66231720ea812977a6a7812cf8a8de7d944fa2fe06b3e3863968a28d2a2347f119c48d239d6b28b7e148c64f26a16ca292fe8d4c212bef83570fbd76ab7a70fbe21a3030a387923610be630242153e0d6c43c5c12da515f654cf1327df9fff389b9b950359e03cc0fb18fc34afcce497c4fe5dc7edf8dbe1bbee594a0d1f000a416500a04e29de1a1f7727c77378345da8641a15e3717060a3ed7e4ea87279ddcf974cf069bbe86f7da3b84df6ac463bc254d9c5b85725195eb7a735b2e0b38bc2a7dffcb6f8cd85212f68dbc3ca7e66a23420ff00cae7f618c1220cd091c41b219d1d2d89ba5b53d73cebd0adaaeb0c44b8b817ea7f7c6647c12ec7bba289cc652ab8e9cde7b0edec124365d46c80fb2874834528c4675eff6866"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:49 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:49 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:49 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:49 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:49 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="140000080003ffff00000000000000000000a5ce1577f94fe19a69cdb3d821197a1a4b18df3d104f02de27574925ab9b00009edc9d03d04aa27681c11d7e4ad11f6663adb19e4363a01d6d89ea93d8f4d4c622600a19efbc7001d7b81e1a36163d0aa2976d1f5e451bd076c662f7899066ece907362366ade6fddd2e955489b7d79d8a794b66231720ea812977a6a7812cf8a8de7d944fa2fe06b3e3863968a28d2a2347f119c48d239d6b28b7e148c64f26a16ca292fe8d4c212bef83570fbd76ab7a70fbe21a3030a387923610be630242153e0d6c43c5c12da515f654cf1327df9fff389b9b950359e03cc0fb18fc34afcce497c4fe5dc7edf8dbe1bbee594a0d1f000a416500a04e29de1a1f7727c77378345da8641a15e3717060a3ed7e4ea87279ddcf974cf069bbe86f7da3b84df6ac463bc254d9c5b85725195eb7a735b2e0b38bc2a7dffcb6f8cd85212f68dbc3ca7e66a23420ff00cae7f618c1220cd091c41b219d1d2d89ba5b53d73cebd0adaaeb0c44b8b817ea7f7c6647c12ec7bba289cc652ab8e9cde7b0edec124365d46c80fb2874834528c4675eff6866"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:49 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:49 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:49 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:50 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:50 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="140000080003ffff00000000000000000000a5ce1577f94fe19a69cdb3d821197a1a4b18df3d104f02de27574925ab9b00009edc9d03d04aa27681c11d7e4ad11f6663adb19e4363a01d6d89ea93d8f4d4c622600a19efbc7001d7b81e1a36163d0aa2976d1f5e451bd076c662f7899066ece907362366ade6fddd2e955489b7d79d8a794b66231720ea812977a6a7812cf8a8de7d944fa2fe06b3e3863968a28d2a2347f119c48d239d6b28b7e148c64f26a16ca292fe8d4c212bef83570fbd76ab7a70fbe21a3030a387923610be630242153e0d6c43c5c12da515f654cf1327df9fff389b9b950359e03cc0fb18fc34afcce497c4fe5dc7edf8dbe1bbee594a0d1f000a416500a04e29de1a1f7727c77378345da8641a15e3717060a3ed7e4ea87279ddcf974cf069bbe86f7da3b84df6ac463bc254d9c5b85725195eb7a735b2e0b38bc2a7dffcb6f8cd85212f68dbc3ca7e66a23420ff00cae7f618c1220cd091c41b219d1d2d89ba5b53d73cebd0adaaeb0c44b8b817ea7f7c6647c12ec7bba289cc652ab8e9cde7b0edec124365d46c80fb2874834528c4675eff6866"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:50 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:50 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="140000080003ffff00000000000000000000a5ce1577f94fe19a69cdb3d821197a1a4b18df3d104f02de27574925ab9b00009edc9d03d04aa27681c11d7e4ad11f6663adb19e4363a01d6d89ea93d8f4d4c622600a19efbc7001d7b81e1a36163d0aa2976d1f5e451bd076c662f7899066ece907362366ade6fddd2e955489b7d79d8a794b66231720ea812977a6a7812cf8a8de7d944fa2fe06b3e3863968a28d2a2347f119c48d239d6b28b7e148c64f26a16ca292fe8d4c212bef83570fbd76ab7a70fbe21a3030a387923610be630242153e0d6c43c5c12da515f654cf1327df9fff389b9b950359e03cc0fb18fc34afcce497c4fe5dc7edf8dbe1bbee594a0d1f000a416500a04e29de1a1f7727c77378345da8641a15e3717060a3ed7e4ea87279ddcf974cf069bbe86f7da3b84df6ac463bc254d9c5b85725195eb7a735b2e0b38bc2a7dffcb6f8cd85212f68dbc3ca7e66a23420ff00cae7f618c1220cd091c41b219d1d2d89ba5b53d73cebd0adaaeb0c44b8b817ea7f7c6647c12ec7bba289cc652ab8e9cde7b0edec124365d46c80fb2874834528c4675eff6866"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:50 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="140000080003ffff00000000000000000000a5ce1577f94fe19a69cdb3d821197a1a4b18df3d104f02de27574925ab9b00009edc9d03d04aa27681c11d7e4ad11f6663adb19e4363a01d6d89ea93d8f4d4c622600a19efbc7001d7b81e1a36163d0aa2976d1f5e451bd076c662f7899066ece907362366ade6fddd2e955489b7d79d8a794b66231720ea812977a6a7812cf8a8de7d944fa2fe06b3e3863968a28d2a2347f119c48d239d6b28b7e148c64f26a16ca292fe8d4c212bef83570fbd76ab7a70fbe21a3030a387923610be630242153e0d6c43c5c12da515f654cf1327df9fff389b9b950359e03cc0fb18fc34afcce497c4fe5dc7edf8dbe1bbee594a0d1f000a416500a04e29de1a1f7727c77378345da8641a15e3717060a3ed7e4ea87279ddcf974cf069bbe86f7da3b84df6ac463bc254d9c5b85725195eb7a735b2e0b38bc2a7dffcb6f8cd85212f68dbc3ca7e66a23420ff00cae7f618c1220cd091c41b219d1d2d89ba5b53d73cebd0adaaeb0c44b8b817ea7f7c6647c12ec7bba289cc652ab8e9cde7b0edec124365d46c80fb2874834528c4675eff6866"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:50 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:50 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:50 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:50 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="140000080003ffff00000000000000000000a5ce1577f94fe19a69cdb3d821197a1a4b18df3d104f02de27574925ab9b00009edc9d03d04aa27681c11d7e4ad11f6663adb19e4363a01d6d89ea93d8f4d4c622600a19efbc7001d7b81e1a36163d0aa2976d1f5e451bd076c662f7899066ece907362366ade6fddd2e955489b7d79d8a794b66231720ea812977a6a7812cf8a8de7d944fa2fe06b3e3863968a28d2a2347f119c48d239d6b28b7e148c64f26a16ca292fe8d4c212bef83570fbd76ab7a70fbe21a3030a387923610be630242153e0d6c43c5c12da515f654cf1327df9fff389b9b950359e03cc0fb18fc34afcce497c4fe5dc7edf8dbe1bbee594a0d1f000a416500a04e29de1a1f7727c77378345da8641a15e3717060a3ed7e4ea87279ddcf974cf069bbe86f7da3b84df6ac463bc254d9c5b85725195eb7a735b2e0b38bc2a7dffcb6f8cd85212f68dbc3ca7e66a23420ff00cae7f618c1220cd091c41b219d1d2d89ba5b53d73cebd0adaaeb0c44b8b817ea7f7c6647c12ec7bba289cc652ab8e9cde7b0edec124365d46c80fb2874834528c4675eff6866"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:50 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="140000080003ffff00000000000000000000a5ce1577f94fe19a69cdb3d821197a1a4b18df3d104f02de27574925ab9b00009edc9d03d04aa27681c11d7e4ad11f6663adb19e4363a01d6d89ea93d8f4d4c622600a19efbc7001d7b81e1a36163d0aa2976d1f5e451bd076c662f7899066ece907362366ade6fddd2e955489b7d79d8a794b66231720ea812977a6a7812cf8a8de7d944fa2fe06b3e3863968a28d2a2347f119c48d239d6b28b7e148c64f26a16ca292fe8d4c212bef83570fbd76ab7a70fbe21a3030a387923610be630242153e0d6c43c5c12da515f654cf1327df9fff389b9b950359e03cc0fb18fc34afcce497c4fe5dc7edf8dbe1bbee594a0d1f000a416500a04e29de1a1f7727c77378345da8641a15e3717060a3ed7e4ea87279ddcf974cf069bbe86f7da3b84df6ac463bc254d9c5b85725195eb7a735b2e0b38bc2a7dffcb6f8cd85212f68dbc3ca7e66a23420ff00cae7f618c1220cd091c41b219d1d2d89ba5b53d73cebd0adaaeb0c44b8b817ea7f7c6647c12ec7bba289cc652ab8e9cde7b0edec124365d46c80fb2874834528c4675eff6866"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:50 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:50 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:50 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:50 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:50 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:50 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:50 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:50 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="140000080003ffff00000000000000000000a5ce1577f94fe19a69cdb3d821197a1a4b18df3d104f02de27574925ab9b00009edc9d03d04aa27681c11d7e4ad11f6663adb19e4363a01d6d89ea93d8f4d4c622600a19efbc7001d7b81e1a36163d0aa2976d1f5e451bd076c662f7899066ece907362366ade6fddd2e955489b7d79d8a794b66231720ea812977a6a7812cf8a8de7d944fa2fe06b3e3863968a28d2a2347f119c48d239d6b28b7e148c64f26a16ca292fe8d4c212bef83570fbd76ab7a70fbe21a3030a387923610be630242153e0d6c43c5c12da515f654cf1327df9fff389b9b950359e03cc0fb18fc34afcce497c4fe5dc7edf8dbe1bbee594a0d1f000a416500a04e29de1a1f7727c77378345da8641a15e3717060a3ed7e4ea87279ddcf974cf069bbe86f7da3b84df6ac463bc254d9c5b85725195eb7a735b2e0b38bc2a7dffcb6f8cd85212f68dbc3ca7e66a23420ff00cae7f618c1220cd091c41b219d1d2d89ba5b53d73cebd0adaaeb0c44b8b817ea7f7c6647c12ec7bba289cc652ab8e9cde7b0edec124365d46c80fb2874834528c4675eff6866"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:50 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:50 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="140000080003ffff00000000000000000000a5ce1577f94fe19a69cdb3d821197a1a4b18df3d104f02de27574925ab9b00009edc9d03d04aa27681c11d7e4ad11f6663adb19e4363a01d6d89ea93d8f4d4c622600a19efbc7001d7b81e1a36163d0aa2976d1f5e451bd076c662f7899066ece907362366ade6fddd2e955489b7d79d8a794b66231720ea812977a6a7812cf8a8de7d944fa2fe06b3e3863968a28d2a2347f119c48d239d6b28b7e148c64f26a16ca292fe8d4c212bef83570fbd76ab7a70fbe21a3030a387923610be630242153e0d6c43c5c12da515f654cf1327df9fff389b9b950359e03cc0fb18fc34afcce497c4fe5dc7edf8dbe1bbee594a0d1f000a416500a04e29de1a1f7727c77378345da8641a15e3717060a3ed7e4ea87279ddcf974cf069bbe86f7da3b84df6ac463bc254d9c5b85725195eb7a735b2e0b38bc2a7dffcb6f8cd85212f68dbc3ca7e66a23420ff00cae7f618c1220cd091c41b219d1d2d89ba5b53d73cebd0adaaeb0c44b8b817ea7f7c6647c12ec7bba289cc652ab8e9cde7b0edec124365d46c80fb2874834528c4675eff6866"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:51 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="140000080003ffff00000000000000000000a5ce1577f94fe19a69cdb3d821197a1a4b18df3d104f02de27574925ab9b00009edc9d03d04aa27681c11d7e4ad11f6663adb19e4363a01d6d89ea93d8f4d4c622600a19efbc7001d7b81e1a36163d0aa2976d1f5e451bd076c662f7899066ece907362366ade6fddd2e955489b7d79d8a794b66231720ea812977a6a7812cf8a8de7d944fa2fe06b3e3863968a28d2a2347f119c48d239d6b28b7e148c64f26a16ca292fe8d4c212bef83570fbd76ab7a70fbe21a3030a387923610be630242153e0d6c43c5c12da515f654cf1327df9fff389b9b950359e03cc0fb18fc34afcce497c4fe5dc7edf8dbe1bbee594a0d1f000a416500a04e29de1a1f7727c77378345da8641a15e3717060a3ed7e4ea87279ddcf974cf069bbe86f7da3b84df6ac463bc254d9c5b85725195eb7a735b2e0b38bc2a7dffcb6f8cd85212f68dbc3ca7e66a23420ff00cae7f618c1220cd091c41b219d1d2d89ba5b53d73cebd0adaaeb0c44b8b817ea7f7c6647c12ec7bba289cc652ab8e9cde7b0edec124365d46c80fb2874834528c4675eff6866"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:51 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:51 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x800000c0045009, &(0x7f00000000c0)=0x4) 03:37:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7d9288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000001440)="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", 0x290}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008cc0)=[{{0x0, 0xfffffffffffffe06, &(0x7f0000003a40)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1, 0x0, 0x5c}}], 0x1, 0x0, 0x0) 03:37:51 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:51 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7d9288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000001440)="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", 0x290}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008cc0)=[{{0x0, 0xfffffffffffffe06, &(0x7f0000003a40)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1, 0x0, 0x5c}}], 0x1, 0x0, 0x0) 03:37:51 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x800000c0045009, &(0x7f00000000c0)=0x4) 03:37:51 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7d9288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000001440)="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", 0x290}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008cc0)=[{{0x0, 0xfffffffffffffe06, &(0x7f0000003a40)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1, 0x0, 0x5c}}], 0x1, 0x0, 0x0) 03:37:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7d9288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000001440)="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", 0x290}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008cc0)=[{{0x0, 0xfffffffffffffe06, &(0x7f0000003a40)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1, 0x0, 0x5c}}], 0x1, 0x0, 0x0) 03:37:51 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7d9288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000001440)="c9f7e535b9be687ad1288ba55782de3d45e3bcd55bbd8c4847914b415fe4ef3dc90ffb983956a86e2bd5a62525c21a33d7d9c89eab8bd87024d69eb2b9e8efe67ba0ed67660d60184d98b31acb9496d34e10008b8a4ef1627797394b0111c393db8649a3a925abcc1e6ac1e46054d97d13cdacbdf2858bd6c3015ec3d6830bf0fd9a68afbb62f18c181169599c00cbf92fdd3df4c9dc2e72537954adc792030888a85e38682d6837b39a5841da13e3352299cc7017a5e042bc334b00cc10ed107cb97c2b0ef6f6ed770620db8d7fe0668fd6ea4725680e70800d1a480a9ef8d9cfc02403b8ed63d658c9cef30af92dc074328f1ad0f0a1e231e7017b89f492cfb1ea2dbb30b335f651f6e6ea33940d03e6173ec117eae95e87a3f9c96a1619a5e480712626fa0e24dbc33d4a071ebbd9b025bb3bd56ec1303a740aef2cc39d44a4d2524c32be831d617e0077acde9d1a608cb45b2fe908994c9278d24283440bf9439c4b173afaa50588c64a98b22114e2c7897a7053ba1f5a475b64a579b5d2c73e28552d9f0387042baab41bcdf2fd1959706953948813c830c54c8701eebfa85589b0c5e0068d6cba5221bb71b837a2cbaac891643d6603631117c037ab47e8e6ba8ef4e8fa1bf7580ac9a0e62e30f0d5e2307dd656129932ef9c716c21fa44336d9bce83bfcb03635302fc02fa78d40bd57f4ca3046dd5721806a694772208b2bcf45fe3655f28a4d7077c6c29c7d36db26d30d5cd56e88103dc10f63f63850e3361c6fc940f54be61d0dfc04010a4dcc7f2c0dce847adf6f7cb5b9c9acc32ca41ab04215681f2a188291e464d35b6629614396582fa543e76e9601fbc661246c26e1a9764dac2d837d05421c18aeeb618f708a383413650ca262e87f0ea23dd5fc2d119c2e5f4016c8027bfad8d", 0x290}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008cc0)=[{{0x0, 0xfffffffffffffe06, &(0x7f0000003a40)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1, 0x0, 0x5c}}], 0x1, 0x0, 0x0) 03:37:51 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000008c0)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="6a4a5dcb783174947f0200000000000000141d7837594d3836ddc988739f87fc6b31e3c04134de0330604b04005af8be8eadd332070f2ea07c3b5e6874253b3314cff35e01ff00a8") ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x3, 0x82}, {0xc0, 0x401}, 0x8000, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000002c0)={0x101, 0x0, 0xff00000000000000, 'queue0\x00', 0xfffffffff7fffff9}) syz_emit_ethernet(0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX, @ANYRESHEX], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000440)={0x28, 0x0, 0x2, {{0x7fff, 0x7, 0x2, r1}}}, 0x28) r2 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r3 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x3f, 0x2003) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, r4, 0x704, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r5, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000680)={{0x5, 0x2}, {0x8, 0xf0cc}, 0x80000001, 0x5, 0x7ff}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000480)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000780)=[@in={0x2, 0x4e21, @rand_addr=0xc20}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3b0}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e23, 0x3, @local, 0x3}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}], 0x78) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x1814c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fd) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000280)=0x4) 03:37:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7d9288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000001440)="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", 0x290}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008cc0)=[{{0x0, 0xfffffffffffffe06, &(0x7f0000003a40)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1, 0x0, 0x5c}}], 0x1, 0x0, 0x0) 03:37:51 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7d9288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000001440)="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", 0x290}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008cc0)=[{{0x0, 0xfffffffffffffe06, &(0x7f0000003a40)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1, 0x0, 0x5c}}], 0x1, 0x0, 0x0) 03:37:51 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7d9288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000001440)="c9f7e535b9be687ad1288ba55782de3d45e3bcd55bbd8c4847914b415fe4ef3dc90ffb983956a86e2bd5a62525c21a33d7d9c89eab8bd87024d69eb2b9e8efe67ba0ed67660d60184d98b31acb9496d34e10008b8a4ef1627797394b0111c393db8649a3a925abcc1e6ac1e46054d97d13cdacbdf2858bd6c3015ec3d6830bf0fd9a68afbb62f18c181169599c00cbf92fdd3df4c9dc2e72537954adc792030888a85e38682d6837b39a5841da13e3352299cc7017a5e042bc334b00cc10ed107cb97c2b0ef6f6ed770620db8d7fe0668fd6ea4725680e70800d1a480a9ef8d9cfc02403b8ed63d658c9cef30af92dc074328f1ad0f0a1e231e7017b89f492cfb1ea2dbb30b335f651f6e6ea33940d03e6173ec117eae95e87a3f9c96a1619a5e480712626fa0e24dbc33d4a071ebbd9b025bb3bd56ec1303a740aef2cc39d44a4d2524c32be831d617e0077acde9d1a608cb45b2fe908994c9278d24283440bf9439c4b173afaa50588c64a98b22114e2c7897a7053ba1f5a475b64a579b5d2c73e28552d9f0387042baab41bcdf2fd1959706953948813c830c54c8701eebfa85589b0c5e0068d6cba5221bb71b837a2cbaac891643d6603631117c037ab47e8e6ba8ef4e8fa1bf7580ac9a0e62e30f0d5e2307dd656129932ef9c716c21fa44336d9bce83bfcb03635302fc02fa78d40bd57f4ca3046dd5721806a694772208b2bcf45fe3655f28a4d7077c6c29c7d36db26d30d5cd56e88103dc10f63f63850e3361c6fc940f54be61d0dfc04010a4dcc7f2c0dce847adf6f7cb5b9c9acc32ca41ab04215681f2a188291e464d35b6629614396582fa543e76e9601fbc661246c26e1a9764dac2d837d05421c18aeeb618f708a383413650ca262e87f0ea23dd5fc2d119c2e5f4016c8027bfad8d", 0x290}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000008cc0)=[{{0x0, 0xfffffffffffffe06, &(0x7f0000003a40)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1, 0x0, 0x5c}}], 0x1, 0x0, 0x0) 03:37:51 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000880)='sysfs\x00^\x04\xdc:\x00\xc2\xa4\xd8j\xd8~*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9b^\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\x01\"\xc8U0%\xa2X9\\\x92QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5B@5CZ=\xbbv\xc5} /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 571.370585] syz-executor.5 D24992 7056 1 0x00000004 [ 571.376360] Call Trace: [ 571.379109] __schedule+0x7be/0x1cf0 [ 571.383109] ? __mutex_lock+0x737/0x1470 [ 571.387409] ? pci_mmcfg_check_reserved+0x150/0x150 [ 571.392505] schedule+0x92/0x1c0 [ 571.395884] schedule_preempt_disabled+0x13/0x20 [ 571.400788] __mutex_lock+0x73c/0x1470 [ 571.404734] ? trace_hardirqs_on+0x10/0x10 [ 571.409524] ? lo_release+0x84/0x1b0 [ 571.413410] ? save_trace+0x250/0x290 [ 571.417263] ? mutex_trylock+0x1c0/0x1c0 [ 571.421426] ? __blkdev_put+0x397/0x7f0 [ 571.425691] ? find_held_lock+0x35/0x130 [ 571.429841] ? __blkdev_put+0x397/0x7f0 [ 571.433896] ? loop_clr_fd+0xae0/0xae0 [ 571.437931] mutex_lock_nested+0x16/0x20 [ 571.442056] ? mutex_lock_nested+0x16/0x20 [ 571.446345] lo_release+0x84/0x1b0 [ 571.449888] ? loop_clr_fd+0xae0/0xae0 [ 571.453844] __blkdev_put+0x436/0x7f0 [ 571.457762] ? bd_set_size+0xb0/0xb0 [ 571.461603] ? wait_for_completion+0x420/0x420 [ 571.466215] blkdev_put+0x88/0x510 [ 571.469773] ? filemap_write_and_wait+0x6f/0xb0 [ 571.474528] kill_block_super+0xbd/0xf0 [ 571.478531] deactivate_locked_super+0x79/0xe0 [ 571.483181] deactivate_super+0x85/0xa0 [ 571.487183] cleanup_mnt+0xb2/0x150 [ 571.491147] __cleanup_mnt+0x16/0x20 [ 571.496890] task_work_run+0x119/0x190 [ 571.500851] exit_to_usermode_loop+0x1da/0x220 [ 571.505452] do_syscall_64+0x4a9/0x630 [ 571.509428] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 571.514339] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 571.519795] RIP: 0033:0x45b7f7 [ 571.523204] RSP: 002b:00007fff52754ae8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a6 [ 571.531008] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 000000000045b7f7 [ 571.538346] RDX: 00000000004032d0 RSI: 0000000000000002 RDI: 00007fff52754b90 [ 571.545715] RBP: 000000000000061f R08: 0000000000000000 R09: 000000000000000b [ 571.553132] R10: 0000000000000005 R11: 0000000000000206 R12: 00007fff52755c20 [ 571.560556] R13: 0000000001faa940 R14: 0000000000000000 R15: 00007fff52755c20 [ 571.568041] INFO: task syz-executor.3:7058 blocked for more than 140 seconds. [ 571.575639] Not tainted 4.14.114 #4 [ 571.579889] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 571.588199] syz-executor.3 D24992 7058 7052 0x00000000 [ 571.593892] Call Trace: [ 571.596538] __schedule+0x7be/0x1cf0 [ 571.600314] ? __mutex_lock+0x737/0x1470 [ 571.604393] ? pci_mmcfg_check_reserved+0x150/0x150 [ 571.609564] schedule+0x92/0x1c0 [ 571.613029] schedule_preempt_disabled+0x13/0x20 [ 571.617799] __mutex_lock+0x73c/0x1470 [ 571.621738] ? trace_hardirqs_on+0x10/0x10 [ 571.625983] ? lo_release+0x1e/0x1b0 [ 571.629680] ? save_trace+0x250/0x290 [ 571.633542] ? mutex_trylock+0x1c0/0x1c0 [ 571.637617] ? __blkdev_put+0x397/0x7f0 [ 571.641701] ? find_held_lock+0x35/0x130 [ 571.645782] ? __blkdev_put+0x397/0x7f0 [ 571.649754] ? loop_clr_fd+0xae0/0xae0 [ 571.653722] mutex_lock_nested+0x16/0x20 [ 571.657788] ? mutex_lock_nested+0x16/0x20 [ 571.662327] lo_release+0x1e/0x1b0 [ 571.665997] ? loop_clr_fd+0xae0/0xae0 [ 571.669872] __blkdev_put+0x436/0x7f0 [ 571.673742] ? bd_set_size+0xb0/0xb0 [ 571.677462] ? wait_for_completion+0x420/0x420 [ 571.682218] blkdev_put+0x88/0x510 [ 571.685775] ? filemap_write_and_wait+0x6f/0xb0 [ 571.690519] kill_block_super+0xbd/0xf0 [ 571.694505] deactivate_locked_super+0x79/0xe0 [ 571.699086] deactivate_super+0x85/0xa0 [ 571.703469] cleanup_mnt+0xb2/0x150 [ 571.707107] __cleanup_mnt+0x16/0x20 [ 571.710875] task_work_run+0x119/0x190 [ 571.714788] exit_to_usermode_loop+0x1da/0x220 [ 571.719362] do_syscall_64+0x4a9/0x630 [ 571.723465] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 571.728357] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 571.733625] RIP: 0033:0x45b7f7 [ 571.736822] RSP: 002b:00007ffd15f5d3f8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a6 [ 571.744594] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 000000000045b7f7 [ 571.752092] RDX: 00000000004032d0 RSI: 0000000000000002 RDI: 00007ffd15f5d4a0 [ 571.759363] RBP: 0000000000000657 R08: 0000000000000000 R09: 000000000000000b [ 571.766685] R10: 0000000000000005 R11: 0000000000000206 R12: 00007ffd15f5e530 [ 571.774012] R13: 0000000000c46940 R14: 0000000000000000 R15: 00007ffd15f5e530 [ 571.781374] INFO: task syz-executor.2:7060 blocked for more than 140 seconds. [ 571.788769] Not tainted 4.14.114 #4 [ 571.792987] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 571.800998] syz-executor.2 D25168 7060 7054 0x00000000 [ 571.806670] Call Trace: [ 571.809291] __schedule+0x7be/0x1cf0 [ 571.813085] ? __mutex_lock+0x737/0x1470 [ 571.817175] ? pci_mmcfg_check_reserved+0x150/0x150 [ 571.822258] schedule+0x92/0x1c0 [ 571.825646] schedule_preempt_disabled+0x13/0x20 [ 571.830552] __mutex_lock+0x73c/0x1470 [ 571.834468] ? lo_open+0x1d/0xb0 [ 571.837852] ? refcount_add+0x40/0x50 [ 571.841810] ? mutex_trylock+0x1c0/0x1c0 [ 571.845886] ? exact_match+0xd/0x20 [ 571.849544] ? kobj_lookup+0x319/0x410 [ 571.853636] ? loop_unregister_transfer+0x90/0x90 [ 571.858503] mutex_lock_nested+0x16/0x20 [ 571.862625] ? mutex_lock_nested+0x16/0x20 [ 571.866919] lo_open+0x1d/0xb0 [ 571.870373] __blkdev_get+0xab1/0x1120 [ 571.874285] ? __blkdev_put+0x7f0/0x7f0 [ 571.878259] ? bd_acquire+0x178/0x2c0 [ 571.882171] ? find_held_lock+0x35/0x130 [ 571.886251] blkdev_get+0xa8/0x8e0 [ 571.889784] ? bd_may_claim+0xd0/0xd0 [ 571.893665] ? _raw_spin_unlock+0x2d/0x50 [ 571.897831] blkdev_open+0x1d1/0x260 [ 571.901619] ? security_file_open+0x8f/0x1a0 [ 571.906104] do_dentry_open+0x73e/0xeb0 [ 571.910236] ? bd_acquire+0x2c0/0x2c0 [ 571.914063] vfs_open+0x105/0x230 [ 571.917529] path_openat+0x8bd/0x3f70 [ 571.921394] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 571.926129] ? __alloc_fd+0x1d4/0x4a0 [ 571.930103] do_filp_open+0x18e/0x250 [ 571.933920] ? may_open_dev+0xe0/0xe0 [ 571.937721] ? _raw_spin_unlock+0x2d/0x50 [ 571.941932] ? __alloc_fd+0x1d4/0x4a0 [ 571.945745] do_sys_open+0x2c5/0x430 [ 571.949452] ? filp_open+0x70/0x70 [ 571.953064] SyS_open+0x2d/0x40 [ 571.956347] ? do_sys_open+0x430/0x430 [ 571.960275] do_syscall_64+0x1eb/0x630 [ 571.964177] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 571.969054] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 571.974417] RIP: 0033:0x412d20 [ 571.977621] RSP: 002b:00007ffd743993c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 571.985469] RAX: ffffffffffffffda RBX: 0000000000061390 RCX: 0000000000412d20 [ 571.992792] RDX: 00007ffd7439945a RSI: 0000000000000002 RDI: 00007ffd74399450 [ 572.000193] RBP: 000000000000062c R08: 0000000000000000 R09: 000000000000000a [ 572.007471] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000000 [ 572.014796] R13: 00007ffd74399400 R14: 0000000000061047 R15: 00007ffd74399410 [ 572.022392] INFO: task syz-executor.4:21536 blocked for more than 140 seconds. [ 572.029805] Not tainted 4.14.114 #4 [ 572.034016] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 572.042060] syz-executor.4 D28320 21536 7061 0x00000004 [ 572.047697] Call Trace: [ 572.050352] __schedule+0x7be/0x1cf0 [ 572.054078] ? __mutex_lock+0x737/0x1470 [ 572.058152] ? pci_mmcfg_check_reserved+0x150/0x150 [ 572.063264] schedule+0x92/0x1c0 [ 572.066651] schedule_preempt_disabled+0x13/0x20 [ 572.072382] __mutex_lock+0x73c/0x1470 [ 572.076298] ? blkdev_reread_part+0x1f/0x40 [ 572.080693] ? mutex_trylock+0x1c0/0x1c0 [ 572.084768] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 572.089970] ? __wake_up_common_lock+0xe3/0x160 [ 572.094779] mutex_lock_nested+0x16/0x20 [ 572.098861] ? mutex_lock_nested+0x16/0x20 [ 572.103263] blkdev_reread_part+0x1f/0x40 [ 572.107427] loop_reread_partitions+0x7c/0x90 [ 572.112163] loop_set_status+0xc28/0x1200 [ 572.116384] loop_set_status64+0xa6/0xf0 [ 572.120509] ? loop_set_status_old+0x2d0/0x2d0 [ 572.125116] lo_ioctl+0x5c1/0x1c70 [ 572.128648] ? retint_kernel+0x2d/0x2d [ 572.132624] ? loop_probe+0x160/0x160 [ 572.136436] blkdev_ioctl+0x983/0x1880 [ 572.140435] ? blkpg_ioctl+0x980/0x980 [ 572.144344] ? __might_sleep+0x93/0xb0 [ 572.148220] ? __fget+0x210/0x370 [ 572.151933] block_ioctl+0xde/0x120 [ 572.155595] ? blkdev_fallocate+0x3b0/0x3b0 [ 572.159918] do_vfs_ioctl+0x7b9/0x1070 [ 572.163903] ? selinux_file_mprotect+0x5d0/0x5d0 [ 572.168677] ? lock_downgrade+0x6e0/0x6e0 [ 572.172897] ? ioctl_preallocate+0x1c0/0x1c0 [ 572.178251] ? __fget+0x237/0x370 [ 572.181772] ? security_file_ioctl+0x8f/0xc0 [ 572.186199] SyS_ioctl+0x8f/0xc0 [ 572.189564] ? do_vfs_ioctl+0x1070/0x1070 [ 572.193795] do_syscall_64+0x1eb/0x630 [ 572.197690] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 572.202595] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 572.207845] RIP: 0033:0x458c17 [ 572.211077] RSP: 002b:00007f56572369f8 EFLAGS: 00000202 ORIG_RAX: 0000000000000010 [ 572.218803] RAX: ffffffffffffffda RBX: 00007f56572376d4 RCX: 0000000000458c17 [ 572.226137] RDX: 00007f5657236ab0 RSI: 0000000000004c04 RDI: 0000000000000006 [ 572.233509] RBP: 0000000000001000 R08: 0000000000000000 R09: 000000000000000a [ 572.240842] R10: 0000000000000075 R11: 0000000000000202 R12: 0000000000000005 [ 572.248176] R13: 0000000000000005 R14: 0000000000000006 R15: 00000000ffffffff [ 572.255760] INFO: task blkid:21573 blocked for more than 140 seconds. [ 572.262378] Not tainted 4.14.114 #4 [ 572.266509] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 572.274518] blkid D29040 21573 7023 0x00000004 [ 572.280201] Call Trace: [ 572.282797] __schedule+0x7be/0x1cf0 [ 572.286504] ? __mutex_lock+0x737/0x1470 [ 572.290642] ? pci_mmcfg_check_reserved+0x150/0x150 [ 572.295687] schedule+0x92/0x1c0 [ 572.299062] schedule_preempt_disabled+0x13/0x20 [ 572.303889] __mutex_lock+0x73c/0x1470 [ 572.307785] ? lo_open+0x1d/0xb0 [ 572.311326] ? refcount_add+0x40/0x50 [ 572.315137] ? mutex_trylock+0x1c0/0x1c0 [ 572.319180] ? exact_match+0xd/0x20 [ 572.322851] ? kobj_lookup+0x319/0x410 [ 572.326784] ? loop_unregister_transfer+0x90/0x90 [ 572.331699] mutex_lock_nested+0x16/0x20 [ 572.335765] ? mutex_lock_nested+0x16/0x20 [ 572.339995] lo_open+0x1d/0xb0 [ 572.343255] __blkdev_get+0xab1/0x1120 [ 572.347288] ? __blkdev_put+0x7f0/0x7f0 [ 572.351406] ? bd_acquire+0x178/0x2c0 [ 572.355303] ? find_held_lock+0x35/0x130 [ 572.359492] blkdev_get+0xa8/0x8e0 [ 572.363168] ? bd_may_claim+0xd0/0xd0 [ 572.367013] ? _raw_spin_unlock+0x2d/0x50 [ 572.371224] blkdev_open+0x1d1/0x260 [ 572.374986] ? security_file_open+0x8f/0x1a0 [ 572.379394] do_dentry_open+0x73e/0xeb0 [ 572.383412] ? bd_acquire+0x2c0/0x2c0 [ 572.387222] vfs_open+0x105/0x230 [ 572.390997] path_openat+0x8bd/0x3f70 [ 572.394805] ? trace_hardirqs_on+0x10/0x10 [ 572.399026] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 572.403733] ? find_held_lock+0x35/0x130 [ 572.407802] ? __alloc_fd+0x1d4/0x4a0 [ 572.411674] do_filp_open+0x18e/0x250 [ 572.415472] ? may_open_dev+0xe0/0xe0 [ 572.419399] ? _raw_spin_unlock+0x2d/0x50 [ 572.423685] ? __alloc_fd+0x1d4/0x4a0 [ 572.427604] do_sys_open+0x2c5/0x430 [ 572.431513] ? filp_open+0x70/0x70 [ 572.435067] SyS_open+0x2d/0x40 [ 572.438340] ? do_sys_open+0x430/0x430 [ 572.442275] do_syscall_64+0x1eb/0x630 [ 572.446241] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 572.451169] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 572.456455] RIP: 0033:0x7fc2c26a4120 [ 572.460211] RSP: 002b:00007ffc5aebf788 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 572.467931] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fc2c26a4120 [ 572.475252] RDX: 00007ffc5aec1f40 RSI: 0000000000000000 RDI: 00007ffc5aec1f40 [ 572.482567] RBP: 0000000000000000 R08: 0000000000000078 R09: 0000000000000000 [ 572.490001] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000023c4030 [ 572.497533] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000005 [ 572.505105] [ 572.505105] Showing all locks held in the system: [ 572.511597] 1 lock held by khungtaskd/1008: [ 572.516298] #0: (tasklist_lock){.+.+}, at: [] debug_show_all_locks+0x7f/0x21f [ 572.525973] 2 locks held by getty/7015: [ 572.530178] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 572.539289] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 572.548859] 2 locks held by getty/7016: [ 572.552905] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 572.561991] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 572.571739] 2 locks held by getty/7017: [ 572.575705] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 572.584436] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 572.593781] 2 locks held by getty/7018: [ 572.597745] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 572.606496] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 572.615887] 2 locks held by getty/7019: [ 572.620141] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 572.628947] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 572.638294] 2 locks held by getty/7020: [ 572.642305] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 572.651067] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 572.660411] 2 locks held by getty/7021: [ 572.664374] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 572.673121] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 572.682468] 3 locks held by syz-executor.5/7056: [ 572.687206] #0: (&bdev->bd_mutex){+.+.}, at: [] __blkdev_put+0xa6/0x7f0 [ 572.695757] #1: (loop_index_mutex){+.+.}, at: [] lo_release+0x1e/0x1b0 [ 572.704228] #2: (loop_ctl_mutex#2){+.+.}, at: [] lo_release+0x84/0x1b0 [ 572.712838] 2 locks held by syz-executor.3/7058: [ 572.717601] #0: (&bdev->bd_mutex){+.+.}, at: [] __blkdev_put+0xa6/0x7f0 [ 572.726163] #1: (loop_index_mutex){+.+.}, at: [] lo_release+0x1e/0x1b0 [ 572.734637] 2 locks held by syz-executor.2/7060: [ 572.739391] #0: (&bdev->bd_mutex){+.+.}, at: [] __blkdev_get+0x145/0x1120 [ 572.748142] #1: (loop_index_mutex){+.+.}, at: [] lo_open+0x1d/0xb0 [ 572.756318] 2 locks held by syz-executor.4/21536: [ 572.761259] #0: (loop_ctl_mutex/1){+.+.}, at: [] lo_ioctl+0x87/0x1c70 [ 572.769634] #1: (&bdev->bd_mutex){+.+.}, at: [] blkdev_reread_part+0x1f/0x40 [ 572.778641] 2 locks held by blkid/21573: [ 572.782812] #0: (&bdev->bd_mutex){+.+.}, at: [] __blkdev_get+0x145/0x1120 [ 572.791658] #1: (loop_index_mutex){+.+.}, at: [] lo_open+0x1d/0xb0 [ 572.799800] [ 572.801550] ============================================= [ 572.801550] [ 572.808664] NMI backtrace for cpu 1 [ 572.812429] CPU: 1 PID: 1008 Comm: khungtaskd Not tainted 4.14.114 #4 [ 572.819010] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 572.828462] Call Trace: [ 572.831041] dump_stack+0x138/0x19c [ 572.834849] nmi_cpu_backtrace.cold+0x57/0x94 [ 572.839357] ? irq_force_complete_move.cold+0x7d/0x7d [ 572.844879] nmi_trigger_cpumask_backtrace+0x141/0x189 [ 572.850266] arch_trigger_cpumask_backtrace+0x14/0x20 [ 572.855652] watchdog+0x5e7/0xb90 [ 572.859113] kthread+0x31c/0x430 [ 572.862616] ? hungtask_pm_notify+0x60/0x60 [ 572.866922] ? kthread_create_on_node+0xd0/0xd0 [ 572.871602] ret_from_fork+0x3a/0x50 [ 572.875466] Sending NMI from CPU 1 to CPUs 0: [ 572.880664] NMI backtrace for cpu 0 [ 572.880669] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 4.14.114 #4 [ 572.880673] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 572.880677] task: ffffffff87676240 task.stack: ffffffff87600000 [ 572.880680] RIP: 0010:check_preemption_disabled+0x17/0x250 [ 572.880683] RSP: 0018:ffff8880aee07f00 EFLAGS: 00000086 [ 572.880689] RAX: ffffffff87676240 RBX: 000000000001f5f0 RCX: 0000000000000000 [ 572.880695] RDX: 0000000000010000 RSI: ffffffff869d1e40 RDI: ffffffff869d1e80 [ 572.880699] RBP: ffff8880aee07f30 R08: 0000008694fbee2c R09: ffff88821fff8008 [ 572.880703] R10: ffff88821fff8010 R11: 0000000000000001 R12: ffffffff87676240 [ 572.880707] R13: ffffffff869d1e40 R14: ffffffff869d1e80 R15: 0000000000000000 [ 572.880710] FS: 0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 572.880714] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 572.880717] CR2: 000000c426682018 CR3: 000000009ffb1000 CR4: 00000000001406f0 [ 572.880721] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 572.880724] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 572.880726] Call Trace: [ 572.880728] [ 572.880731] debug_smp_processor_id+0x1c/0x20 [ 572.880734] irqtime_account_irq+0x1c/0x290 [ 572.880736] irq_exit+0x4c/0x1b0 [ 572.880739] scheduler_ipi+0x18b/0x4e0 [ 572.880741] smp_reschedule_interrupt+0x89/0x500 [ 572.880744] reschedule_interrupt+0x8e/0xa0 [ 572.880745] [ 572.880748] RIP: 0010:native_safe_halt+0x2/0x10 [ 572.880751] RSP: 0018:ffffffff87607de8 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff02 [ 572.880757] RAX: 1ffffffff0ee2970 RBX: ffffffff87676240 RCX: 0000000000000000 [ 572.880760] RDX: dffffc0000000000 RSI: 0000000000000001 RDI: ffffffff87676abc [ 572.880764] RBP: ffffffff87607e10 R08: 1ffffffff1049a01 R09: 0000000000000000 [ 572.880767] R10: 0000000000000000 R11: 0000000000000000 R12: ffffffff87714b70 [ 572.880771] R13: 0000000000000000 R14: 0000000000000000 R15: ffffffff87676240 [ 572.880773] ? default_idle+0x4c/0x380 [ 572.880776] arch_cpu_idle+0x10/0x20 [ 572.880778] default_idle_call+0x36/0x90 [ 572.880781] do_idle+0x262/0x3d0 [ 572.880783] cpu_startup_entry+0x1b/0x20 [ 572.880786] rest_init+0xf1/0xf6 [ 572.880789] ? trace_event_define_fields_x86_irq_vector+0x2c/0x2c [ 572.880791] start_kernel+0x6e2/0x700 [ 572.880794] ? mem_encrypt_init+0xb/0xb [ 572.880796] ? x86_family+0x32/0x40 [ 572.880799] ? load_ucode_bsp+0x1ea/0x1f6 [ 572.880802] x86_64_start_reservations+0x29/0x2b [ 572.880804] x86_64_start_kernel+0x77/0x7b [ 572.880807] secondary_startup_64+0xa5/0xb0 [ 572.880809] Code: e9 2c f2 ff ff e8 aa 4c ae fe e9 58 f1 ff ff 90 90 90 90 90 55 48 89 e5 41 57 41 56 49 89 fe 41 55 49 89 f5 41 54 53 48 83 ec 08 94 a6 84 fe 65 44 8b 25 0c 3f 29 7d 65 8b 05 a5 ab 29 7d a9 [ 572.881783] Kernel panic - not syncing: hung_task: blocked tasks [ 573.154183] CPU: 1 PID: 1008 Comm: khungtaskd Not tainted 4.14.114 #4 [ 573.160750] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 573.170098] Call Trace: [ 573.172747] dump_stack+0x138/0x19c [ 573.176373] panic+0x1f2/0x438 [ 573.179570] ? add_taint.cold+0x16/0x16 [ 573.183693] ? ___preempt_schedule+0x16/0x18 [ 573.188101] watchdog+0x5f8/0xb90 [ 573.191556] kthread+0x31c/0x430 [ 573.194916] ? hungtask_pm_notify+0x60/0x60 [ 573.199325] ? kthread_create_on_node+0xd0/0xd0 [ 573.204161] ret_from_fork+0x3a/0x50 [ 573.209090] Kernel Offset: disabled [ 573.213074] Rebooting in 86400 seconds..