[  OK  ] Started OpenBSD Secure Shell server.
[  OK  ] Started Getty on tty2.
[  OK  ] Started Serial Getty on ttyS0.
[  OK  ] Started Getty on tty1.
[  OK  ] Started getty on tty2-tty6 if dbus and logind are not available.


Debian GNU/Linux 9 syzkaller ttyS0

Warning: Permanently added '10.128.0.171' (ECDSA) to the list of known hosts.
2020/07/09 20:14:48 fuzzer started
2020/07/09 20:14:48 dialing manager at 10.128.0.26:35237
2020/07/09 20:14:48 syscalls: 3150
2020/07/09 20:14:48 code coverage: enabled
2020/07/09 20:14:48 comparison tracing: enabled
2020/07/09 20:14:48 extra coverage: enabled
2020/07/09 20:14:48 setuid sandbox: enabled
2020/07/09 20:14:48 namespace sandbox: enabled
2020/07/09 20:14:48 Android sandbox: /sys/fs/selinux/policy does not exist
2020/07/09 20:14:48 fault injection: enabled
2020/07/09 20:14:48 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled
2020/07/09 20:14:48 net packet injection: enabled
2020/07/09 20:14:48 net device setup: enabled
2020/07/09 20:14:48 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist
2020/07/09 20:14:48 devlink PCI setup: PCI device 0000:00:10.0 is not available
2020/07/09 20:14:48 USB emulation: enabled
20:18:10 executing program 0:

syzkaller login: [  260.641246][ T6813] IPVS: ftp: loaded support on port[0] = 21
20:18:10 executing program 1:

[  260.782837][ T6813] chnl_net:caif_netlink_parms(): no params data found
[  260.872104][ T6813] bridge0: port 1(bridge_slave_0) entered blocking state
[  260.881409][ T6813] bridge0: port 1(bridge_slave_0) entered disabled state
[  260.890127][ T6813] device bridge_slave_0 entered promiscuous mode
[  260.901459][ T6813] bridge0: port 2(bridge_slave_1) entered blocking state
[  260.908927][ T6813] bridge0: port 2(bridge_slave_1) entered disabled state
[  260.925606][ T6813] device bridge_slave_1 entered promiscuous mode
[  260.985048][ T6813] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  261.004657][ T6950] IPVS: ftp: loaded support on port[0] = 21
[  261.017777][ T6813] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  261.060873][ T6813] team0: Port device team_slave_0 added
[  261.087741][ T6813] team0: Port device team_slave_1 added
20:18:10 executing program 2:

[  261.146149][ T6813] batman_adv: batadv0: Adding interface: batadv_slave_0
[  261.153144][ T6813] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  261.181180][ T6813] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[  261.209072][ T6813] batman_adv: batadv0: Adding interface: batadv_slave_1
[  261.234455][ T6813] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  261.294460][ T6813] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[  261.368133][ T6991] IPVS: ftp: loaded support on port[0] = 21
20:18:11 executing program 3:

[  261.470255][ T6813] device hsr_slave_0 entered promiscuous mode
[  261.544897][ T6813] device hsr_slave_1 entered promiscuous mode
[  261.659859][ T7042] IPVS: ftp: loaded support on port[0] = 21
[  261.701616][ T6950] chnl_net:caif_netlink_parms(): no params data found
20:18:11 executing program 4:

[  262.034446][ T6950] bridge0: port 1(bridge_slave_0) entered blocking state
[  262.041548][ T6950] bridge0: port 1(bridge_slave_0) entered disabled state
[  262.072518][ T6950] device bridge_slave_0 entered promiscuous mode
[  262.137596][ T6950] bridge0: port 2(bridge_slave_1) entered blocking state
[  262.154429][ T6950] bridge0: port 2(bridge_slave_1) entered disabled state
[  262.162118][ T6950] device bridge_slave_1 entered promiscuous mode
[  262.223519][ T6991] chnl_net:caif_netlink_parms(): no params data found
[  262.229081][ T7233] IPVS: ftp: loaded support on port[0] = 21
20:18:12 executing program 5:

[  262.303472][ T6950] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  262.320155][ T6813] netdevsim netdevsim0 netdevsim0: renamed from eth0
[  262.387452][ T6950] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  262.409222][ T6813] netdevsim netdevsim0 netdevsim1: renamed from eth1
[  262.446690][ T7042] chnl_net:caif_netlink_parms(): no params data found
[  262.480851][ T6813] netdevsim netdevsim0 netdevsim2: renamed from eth2
[  262.544537][ T6813] netdevsim netdevsim0 netdevsim3: renamed from eth3
[  262.611695][ T7375] IPVS: ftp: loaded support on port[0] = 21
[  262.614953][ T6950] team0: Port device team_slave_0 added
[  262.661121][ T6950] team0: Port device team_slave_1 added
[  262.703525][ T6950] batman_adv: batadv0: Adding interface: batadv_slave_0
[  262.711490][ T6950] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  262.738948][ T6950] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[  262.772821][ T6991] bridge0: port 1(bridge_slave_0) entered blocking state
[  262.780061][ T6991] bridge0: port 1(bridge_slave_0) entered disabled state
[  262.788605][ T6991] device bridge_slave_0 entered promiscuous mode
[  262.801377][ T6950] batman_adv: batadv0: Adding interface: batadv_slave_1
[  262.808922][ T6950] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  262.835462][ T6950] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[  262.870615][ T7042] bridge0: port 1(bridge_slave_0) entered blocking state
[  262.883928][ T7042] bridge0: port 1(bridge_slave_0) entered disabled state
[  262.892345][ T7042] device bridge_slave_0 entered promiscuous mode
[  262.902130][ T6991] bridge0: port 2(bridge_slave_1) entered blocking state
[  262.909719][ T6991] bridge0: port 2(bridge_slave_1) entered disabled state
[  262.920455][ T6991] device bridge_slave_1 entered promiscuous mode
[  262.950360][ T7042] bridge0: port 2(bridge_slave_1) entered blocking state
[  262.950422][ T7042] bridge0: port 2(bridge_slave_1) entered disabled state
[  262.951378][ T7042] device bridge_slave_1 entered promiscuous mode
[  263.050078][ T6991] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  263.086203][ T7042] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  263.139079][ T6950] device hsr_slave_0 entered promiscuous mode
[  263.204649][ T6950] device hsr_slave_1 entered promiscuous mode
[  263.244432][ T6950] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[  263.252254][ T6950] Cannot create hsr debugfs directory
[  263.260628][ T6991] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  263.299292][ T7042] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  263.333544][ T7233] chnl_net:caif_netlink_parms(): no params data found
[  263.382350][ T6991] team0: Port device team_slave_0 added
[  263.399648][ T6991] team0: Port device team_slave_1 added
[  263.441471][ T7042] team0: Port device team_slave_0 added
[  263.470342][ T7375] chnl_net:caif_netlink_parms(): no params data found
[  263.484620][ T7042] team0: Port device team_slave_1 added
[  263.490852][ T6991] batman_adv: batadv0: Adding interface: batadv_slave_0
[  263.498887][ T6991] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  263.525566][ T6991] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[  263.580621][ T6991] batman_adv: batadv0: Adding interface: batadv_slave_1
[  263.587960][ T6991] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  263.617603][ T6991] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[  263.636005][ T7233] bridge0: port 1(bridge_slave_0) entered blocking state
[  263.643554][ T7233] bridge0: port 1(bridge_slave_0) entered disabled state
[  263.651948][ T7233] device bridge_slave_0 entered promiscuous mode
[  263.660942][ T7042] batman_adv: batadv0: Adding interface: batadv_slave_0
[  263.669088][ T7042] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  263.696809][ T7042] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[  263.713982][ T7042] batman_adv: batadv0: Adding interface: batadv_slave_1
[  263.721330][ T7042] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  263.747752][ T7042] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[  263.767711][ T7233] bridge0: port 2(bridge_slave_1) entered blocking state
[  263.775091][ T7233] bridge0: port 2(bridge_slave_1) entered disabled state
[  263.782796][ T7233] device bridge_slave_1 entered promiscuous mode
[  263.878965][ T6991] device hsr_slave_0 entered promiscuous mode
[  263.934477][ T6991] device hsr_slave_1 entered promiscuous mode
[  263.984213][ T6991] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[  263.991873][ T6991] Cannot create hsr debugfs directory
[  264.011906][ T7233] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  264.076827][ T7042] device hsr_slave_0 entered promiscuous mode
[  264.124852][ T7042] device hsr_slave_1 entered promiscuous mode
[  264.164292][ T7042] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[  264.171906][ T7042] Cannot create hsr debugfs directory
[  264.179205][ T7233] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  264.210253][ T7233] team0: Port device team_slave_0 added
[  264.247848][ T7233] team0: Port device team_slave_1 added
[  264.313382][ T7375] bridge0: port 1(bridge_slave_0) entered blocking state
[  264.320833][ T7375] bridge0: port 1(bridge_slave_0) entered disabled state
[  264.329855][ T7375] device bridge_slave_0 entered promiscuous mode
[  264.338874][ T7375] bridge0: port 2(bridge_slave_1) entered blocking state
[  264.346209][ T7375] bridge0: port 2(bridge_slave_1) entered disabled state
[  264.354169][ T7375] device bridge_slave_1 entered promiscuous mode
[  264.410275][ T7233] batman_adv: batadv0: Adding interface: batadv_slave_0
[  264.419514][ T7233] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  264.447103][ T7233] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[  264.464685][ T7233] batman_adv: batadv0: Adding interface: batadv_slave_1
[  264.471771][ T7233] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  264.498851][ T7233] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[  264.521283][ T7375] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  264.562927][ T6950] netdevsim netdevsim1 netdevsim0: renamed from eth0
[  264.608219][ T7375] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  264.648492][ T6813] 8021q: adding VLAN 0 to HW filter on device bond0
[  264.657345][ T6950] netdevsim netdevsim1 netdevsim1: renamed from eth1
[  264.702541][ T6950] netdevsim netdevsim1 netdevsim2: renamed from eth2
[  264.798839][ T7375] team0: Port device team_slave_0 added
[  264.805754][ T6950] netdevsim netdevsim1 netdevsim3: renamed from eth3
[  264.866537][ T7233] device hsr_slave_0 entered promiscuous mode
[  264.905053][ T7233] device hsr_slave_1 entered promiscuous mode
[  264.944197][ T7233] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[  264.951777][ T7233] Cannot create hsr debugfs directory
[  265.002416][ T7375] team0: Port device team_slave_1 added
[  265.027194][ T7129] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  265.039101][ T7129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  265.065701][ T6813] 8021q: adding VLAN 0 to HW filter on device team0
[  265.102905][ T7375] batman_adv: batadv0: Adding interface: batadv_slave_0
[  265.109946][ T7375] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  265.138372][ T7375] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[  265.160582][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  265.170191][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  265.178880][   T12] bridge0: port 1(bridge_slave_0) entered blocking state
[  265.186238][   T12] bridge0: port 1(bridge_slave_0) entered forwarding state
[  265.195375][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  265.214855][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  265.223823][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  265.233228][ T2513] bridge0: port 2(bridge_slave_1) entered blocking state
[  265.240383][ T2513] bridge0: port 2(bridge_slave_1) entered forwarding state
[  265.248949][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  265.257976][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  265.276139][ T7375] batman_adv: batadv0: Adding interface: batadv_slave_1
[  265.283109][ T7375] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  265.309861][ T7375] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[  265.328118][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  265.340416][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  265.353015][ T7129] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  265.418806][ T7129] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  265.435453][ T7129] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  265.445139][ T7129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  265.454876][ T7129] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  265.467896][ T7042] netdevsim netdevsim3 netdevsim0: renamed from eth0
[  265.587426][ T7375] device hsr_slave_0 entered promiscuous mode
[  265.634473][ T7375] device hsr_slave_1 entered promiscuous mode
[  265.694005][ T7375] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[  265.701589][ T7375] Cannot create hsr debugfs directory
[  265.720589][ T6813] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  265.735039][ T6813] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  265.750005][ T7042] netdevsim netdevsim3 netdevsim1: renamed from eth1
[  265.788920][ T7042] netdevsim netdevsim3 netdevsim2: renamed from eth2
[  265.849371][ T7042] netdevsim netdevsim3 netdevsim3: renamed from eth3
[  265.910855][ T7129] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  265.923350][ T7129] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  265.988767][ T6991] netdevsim netdevsim2 netdevsim0: renamed from eth0
[  266.048479][ T6991] netdevsim netdevsim2 netdevsim1: renamed from eth1
[  266.086116][ T6991] netdevsim netdevsim2 netdevsim2: renamed from eth2
[  266.156807][ T6991] netdevsim netdevsim2 netdevsim3: renamed from eth3
[  266.203928][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  266.211458][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  266.246683][ T6813] 8021q: adding VLAN 0 to HW filter on device batadv0
[  266.287376][ T7233] netdevsim netdevsim4 netdevsim0: renamed from eth0
[  266.389307][ T7233] netdevsim netdevsim4 netdevsim1: renamed from eth1
[  266.450956][ T7233] netdevsim netdevsim4 netdevsim2: renamed from eth2
[  266.516577][ T7233] netdevsim netdevsim4 netdevsim3: renamed from eth3
[  266.598877][ T7129] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[  266.614836][ T7129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  266.646751][ T6950] 8021q: adding VLAN 0 to HW filter on device bond0
[  266.686499][ T7375] netdevsim netdevsim5 netdevsim0: renamed from eth0
[  266.771001][ T7375] netdevsim netdevsim5 netdevsim1: renamed from eth1
[  266.820739][ T7375] netdevsim netdevsim5 netdevsim2: renamed from eth2
[  266.897058][ T7375] netdevsim netdevsim5 netdevsim3: renamed from eth3
[  266.974217][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  266.982417][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  267.011207][ T6950] 8021q: adding VLAN 0 to HW filter on device team0
[  267.060685][ T7975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[  267.071005][ T7975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  267.084323][ T6813] device veth0_vlan entered promiscuous mode
[  267.126996][ T6991] 8021q: adding VLAN 0 to HW filter on device bond0
[  267.135530][ T7975] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  267.148702][ T7975] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  267.156466][ T7975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  267.169569][ T7975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  267.178352][ T7975] bridge0: port 1(bridge_slave_0) entered blocking state
[  267.187248][ T7975] bridge0: port 1(bridge_slave_0) entered forwarding state
[  267.200482][ T6813] device veth1_vlan entered promiscuous mode
[  267.210589][ T7042] 8021q: adding VLAN 0 to HW filter on device bond0
[  267.235415][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[  267.244926][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  267.266899][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  267.277632][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  267.286938][ T2513] bridge0: port 2(bridge_slave_1) entered blocking state
[  267.294115][ T2513] bridge0: port 2(bridge_slave_1) entered forwarding state
[  267.302712][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  267.332322][ T6991] 8021q: adding VLAN 0 to HW filter on device team0
[  267.349228][ T8068] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  267.363285][ T8068] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  267.376616][ T8068] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  267.385078][ T8068] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  267.393931][ T8068] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  267.402401][ T8068] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  267.410501][ T8068] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  267.448318][ T6813] device veth0_macvtap entered promiscuous mode
[  267.459679][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  267.467892][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  267.476522][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  267.486656][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  267.494898][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  267.502545][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[  267.511285][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[  267.520215][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  267.529460][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  267.538060][ T2513] bridge0: port 1(bridge_slave_0) entered blocking state
[  267.545200][ T2513] bridge0: port 1(bridge_slave_0) entered forwarding state
[  267.553056][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[  267.561485][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  267.578612][ T6950] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  267.591316][ T6950] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  267.603454][ T7042] 8021q: adding VLAN 0 to HW filter on device team0
[  267.616859][ T6813] device veth1_macvtap entered promiscuous mode
[  267.632838][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[  267.641007][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  267.650935][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  267.659700][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  267.668501][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  267.677579][   T23] bridge0: port 2(bridge_slave_1) entered blocking state
[  267.684745][   T23] bridge0: port 2(bridge_slave_1) entered forwarding state
[  267.702317][ T7233] 8021q: adding VLAN 0 to HW filter on device bond0
[  267.744804][ T6813] batman_adv: batadv0: Interface activated: batadv_slave_0
[  267.760964][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  267.771578][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  267.782638][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  267.793602][   T12] bridge0: port 1(bridge_slave_0) entered blocking state
[  267.800704][   T12] bridge0: port 1(bridge_slave_0) entered forwarding state
[  267.812904][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  267.821961][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  267.834667][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  267.843046][   T12] bridge0: port 2(bridge_slave_1) entered blocking state
[  267.850189][   T12] bridge0: port 2(bridge_slave_1) entered forwarding state
[  267.861683][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[  267.870669][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[  267.882857][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  267.916046][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  267.929782][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  267.939152][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  267.948972][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  267.958638][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  267.968145][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  267.977139][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  267.988261][ T6813] batman_adv: batadv0: Interface activated: batadv_slave_1
[  268.019982][ T6991] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  268.033342][ T6991] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  268.049861][ T7233] 8021q: adding VLAN 0 to HW filter on device team0
[  268.057677][ T8068] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  268.066430][ T8068] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[  268.076107][ T8068] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[  268.086689][ T8068] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  268.094663][ T8068] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  268.102067][ T8068] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  268.111139][ T8068] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  268.119937][ T8068] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  268.127925][ T8068] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  268.156655][ T6950] 8021q: adding VLAN 0 to HW filter on device batadv0
[  268.166995][ T7129] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  268.176808][ T7129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  268.187167][ T7129] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  268.196521][ T7129] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  268.358662][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  268.367963][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  268.377593][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  268.387450][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  268.396410][   T12] bridge0: port 1(bridge_slave_0) entered blocking state
[  268.403467][   T12] bridge0: port 1(bridge_slave_0) entered forwarding state
[  268.411089][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  268.420203][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  268.429693][ T8069] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  268.439286][ T8069] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  268.446877][ T8069] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  268.478077][ T7375] 8021q: adding VLAN 0 to HW filter on device bond0
[  268.563754][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  268.572431][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
20:18:18 executing program 0:

[  268.613535][   T23] bridge0: port 2(bridge_slave_1) entered blocking state
[  268.620635][   T23] bridge0: port 2(bridge_slave_1) entered forwarding state
[  268.637007][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  268.656946][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
20:18:18 executing program 0:
perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x44f4}, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff)
mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000380)=[0xffffffff, 0xcf3])
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0)
writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="280000001e0009020000000000000000000000009416345d9ff85bba11ce95ee2ce4000000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n', @ANYRES32=0x0, @ANYBLOB], 0x28}}, 0x0)
sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1}, 0x0)
sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000000c0), 0xc, 0x0}, 0x0)
openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x0, 0x0)
write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0)
fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x4)
listen(0xffffffffffffffff, 0x0)
ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0)
write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYBLOB="85122eeac6251427fb9b662af10aab631326c2c2097f576a072efc416f9d9bd986142c24bfa581b809788cd68b4048d3e0d18a69c52024bdef948ed6a98955d1817c7f6c03fb2e0033a389fd123de2d50f56bdac2705881c204e07e7e8d24dc781ed34e2f3219633cf8ef208e223b71bf60f611abd16d7569f67f3636047760acac8f18e9acfaa14d61ced1b401e0f058ebe591ad7047be796b1c7105b4d632e4a79757a3d05ab8c647260985d5699166d49f03abfd5b59856ba85fab9d5e479dc00f6572980ad8164eedd4a9f2d"], 0x12e)
sendmsg$IPCTNL_MSG_CT_GET_DYING(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000280)={&(0x7f0000000100)={0x14, 0x6, 0x1, 0x3, 0x0, 0x0, {0x3}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20004000}, 0x2404c000)

[  268.689153][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  268.703263][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  268.734848][ T7042] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  268.764142][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  268.772868][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  268.790624][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  268.801797][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  268.820056][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  268.830359][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  268.846737][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[  268.862003][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  268.926370][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  268.937958][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  268.960011][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  268.988493][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  269.001163][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
20:18:18 executing program 0:
perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x44f4}, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff)
mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000380)=[0xffffffff, 0xcf3])
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0)
writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="280000001e0009020000000000000000000000009416345d9ff85bba11ce95ee2ce4000000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n', @ANYRES32=0x0, @ANYBLOB], 0x28}}, 0x0)
sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1}, 0x0)
sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000000c0), 0xc, 0x0}, 0x0)
openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x0, 0x0)
write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0)
fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x4)
listen(0xffffffffffffffff, 0x0)
ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0)
write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYBLOB="85122eeac6251427fb9b662af10aab631326c2c2097f576a072efc416f9d9bd986142c24bfa581b809788cd68b4048d3e0d18a69c52024bdef948ed6a98955d1817c7f6c03fb2e0033a389fd123de2d50f56bdac2705881c204e07e7e8d24dc781ed34e2f3219633cf8ef208e223b71bf60f611abd16d7569f67f3636047760acac8f18e9acfaa14d61ced1b401e0f058ebe591ad7047be796b1c7105b4d632e4a79757a3d05ab8c647260985d5699166d49f03abfd5b59856ba85fab9d5e479dc00f6572980ad8164eedd4a9f2d"], 0x12e)
sendmsg$IPCTNL_MSG_CT_GET_DYING(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000280)={&(0x7f0000000100)={0x14, 0x6, 0x1, 0x3, 0x0, 0x0, {0x3}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20004000}, 0x2404c000)

[  269.031291][ T7375] 8021q: adding VLAN 0 to HW filter on device team0
[  269.051070][ T6991] 8021q: adding VLAN 0 to HW filter on device batadv0
[  269.093913][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  269.101435][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  269.120929][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[  269.133008][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  269.149600][ T7233] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  269.182933][ T7042] 8021q: adding VLAN 0 to HW filter on device batadv0
[  269.242097][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  269.281679][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
20:18:19 executing program 0:
perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x44f4}, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff)
mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000380)=[0xffffffff, 0xcf3])
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0)
writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="280000001e0009020000000000000000000000009416345d9ff85bba11ce95ee2ce4000000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n', @ANYRES32=0x0, @ANYBLOB], 0x28}}, 0x0)
sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1}, 0x0)
sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000000c0), 0xc, 0x0}, 0x0)
openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x0, 0x0)
write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0)
fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x4)
listen(0xffffffffffffffff, 0x0)
ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0)
write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYBLOB="85122eeac6251427fb9b662af10aab631326c2c2097f576a072efc416f9d9bd986142c24bfa581b809788cd68b4048d3e0d18a69c52024bdef948ed6a98955d1817c7f6c03fb2e0033a389fd123de2d50f56bdac2705881c204e07e7e8d24dc781ed34e2f3219633cf8ef208e223b71bf60f611abd16d7569f67f3636047760acac8f18e9acfaa14d61ced1b401e0f058ebe591ad7047be796b1c7105b4d632e4a79757a3d05ab8c647260985d5699166d49f03abfd5b59856ba85fab9d5e479dc00f6572980ad8164eedd4a9f2d"], 0x12e)
sendmsg$IPCTNL_MSG_CT_GET_DYING(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000280)={&(0x7f0000000100)={0x14, 0x6, 0x1, 0x3, 0x0, 0x0, {0x3}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20004000}, 0x2404c000)

[  269.289906][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  269.300008][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  269.312448][   T23] bridge0: port 1(bridge_slave_0) entered blocking state
[  269.319631][   T23] bridge0: port 1(bridge_slave_0) entered forwarding state
[  269.329978][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  269.339706][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  269.348650][   T23] bridge0: port 2(bridge_slave_1) entered blocking state
[  269.355812][   T23] bridge0: port 2(bridge_slave_1) entered forwarding state
[  269.367965][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  269.413532][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  269.422412][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  269.470349][ T6950] device veth0_vlan entered promiscuous mode
20:18:19 executing program 0:
clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
exit_group(0x0)
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, <r1=>0x0}, &(0x7f0000000280)=0xc)
ioprio_set$uid(0x3, r1, 0x0)

[  269.577993][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  269.597326][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  269.614027][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
20:18:19 executing program 0:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000040)=0x2, 0x4)
close(r0)

[  269.631177][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  269.648879][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  269.658734][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  269.673224][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[  269.693939][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  269.703182][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[  269.713220][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  269.730420][ T6950] device veth1_vlan entered promiscuous mode
[  269.747512][ T7233] 8021q: adding VLAN 0 to HW filter on device batadv0
20:18:19 executing program 0:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e)
sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0)
recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0)
clock_gettime(0x0, &(0x7f0000000280)={0x0, <r2=>0x0})
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ppoll(&(0x7f0000000000)=[{r1, 0x2103, 0x64}], 0x1, &(0x7f0000000580)={0x0, r2+10000000}, 0x0, 0x0)

[  269.801527][ T6991] device veth0_vlan entered promiscuous mode
[  269.831905][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  269.842149][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  269.852533][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  269.869600][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[  269.882679][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  269.909500][ T7042] device veth0_vlan entered promiscuous mode
[  269.947175][ T7375] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  269.993130][ T7375] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  270.021970][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  270.033215][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  270.042430][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  270.052121][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  270.061671][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[  270.072989][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  270.091620][ T7042] device veth1_vlan entered promiscuous mode
[  270.111493][ T6991] device veth1_vlan entered promiscuous mode
[  270.127600][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[  270.138473][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  270.147433][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  270.156602][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[  270.223529][ T8069] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[  270.231595][ T8069] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[  270.244303][ T8069] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[  270.252830][ T8069] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[  270.275988][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  270.289195][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  270.316949][ T6950] device veth0_macvtap entered promiscuous mode
[  270.331788][ T7375] 8021q: adding VLAN 0 to HW filter on device batadv0
[  270.361106][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[  270.370054][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[  270.380908][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  270.389934][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[  270.399612][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[  270.416905][ T6950] device veth1_macvtap entered promiscuous mode
[  270.431078][ T6991] device veth0_macvtap entered promiscuous mode
[  270.454795][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[  270.463842][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[  270.476298][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[  270.485601][   T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[  270.506415][ T7042] device veth0_macvtap entered promiscuous mode
[  270.518105][ T6991] device veth1_macvtap entered promiscuous mode
[  270.540727][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[  270.552629][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[  270.565587][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  270.576437][ T7233] device veth0_vlan entered promiscuous mode
[  270.586419][ T8069] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  270.598005][ T8069] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  270.618089][ T6950] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[  270.629373][ T6950] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  270.641609][ T6950] batman_adv: batadv0: Interface activated: batadv_slave_0
[  270.654362][ T7042] device veth1_macvtap entered promiscuous mode
[  270.669465][ T7233] device veth1_vlan entered promiscuous mode
[  270.682432][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[  270.691757][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[  270.700989][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[  270.717514][ T6950] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[  270.738428][ T6950] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  270.754623][ T6950] batman_adv: batadv0: Interface activated: batadv_slave_1
[  270.769302][ T6991] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[  270.790456][ T6991] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  270.802389][ T6991] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[  270.816248][ T6991] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  270.830205][ T6991] batman_adv: batadv0: Interface activated: batadv_slave_0
[  270.862065][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[  270.871589][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[  270.884219][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[  270.893014][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[  270.903600][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[  270.927140][ T7042] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[  270.941924][ T7042] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  270.952753][ T7042] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[  270.967705][ T7042] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  270.977969][ T7042] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[  270.988733][ T7042] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  271.001595][ T7042] batman_adv: batadv0: Interface activated: batadv_slave_0
[  271.012949][ T8069] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[  271.022445][ T8069] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  271.031635][ T8069] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[  271.044730][ T8069] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[  271.137713][ T6991] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[  271.148400][ T6991] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  271.158961][ T6991] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[  271.169895][ T6991] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  271.181459][ T6991] batman_adv: batadv0: Interface activated: batadv_slave_1
[  271.191449][ T7042] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[  271.211637][ T7042] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  271.221631][ T7042] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[  271.232131][ T7042] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  271.241990][ T7042] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[  271.252501][ T7042] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  271.264137][ T7042] batman_adv: batadv0: Interface activated: batadv_slave_1
[  271.276032][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[  271.290532][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[  271.299670][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[  271.312097][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[  271.321286][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[  271.333856][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[  271.405603][ T7233] device veth0_macvtap entered promiscuous mode
[  271.434595][ T8068] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[  271.442997][ T8068] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[  271.453027][ T8068] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  271.466226][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  271.474308][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  271.488807][ T7233] device veth1_macvtap entered promiscuous mode
20:18:21 executing program 1:
r0 = socket$inet6(0xa, 0x3, 0x6)
connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c)
r1 = socket$inet6_udp(0xa, 0x2, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup(r2)
getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, <r4=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa)
ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000240)={@empty, @ipv4={[0x0, 0x0, 0x8], [], @multicast1}, @initdev={0xfe, 0x88, [0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7], 0x0, 0x0}, 0x0, 0x1, 0x0, 0x0, 0x7, 0x24c20082, r4})
sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x1e34a95995e)

[  271.501283][ T7375] device veth0_vlan entered promiscuous mode
[  271.662396][ T7233] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[  271.673959][ T7233] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  271.687113][ T7233] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[  271.698649][ T7233] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  271.709780][ T7233] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[  271.720346][ T7233] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  271.730252][ T7233] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[  271.740824][ T7233] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  271.752163][ T7233] batman_adv: batadv0: Interface activated: batadv_slave_0
[  271.856402][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[  271.874287][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[  271.893435][ T7233] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
20:18:21 executing program 2:
perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x7e, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x0, 0x0)

[  271.916802][ T7233] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  271.952480][ T7233] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[  271.989446][ T7233] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  272.000783][ T7233] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[  272.022424][ T7233] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  272.039136][ T7233] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[  272.049976][ T7233] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  272.064088][ T7233] batman_adv: batadv0: Interface activated: batadv_slave_1
[  272.074073][ T7375] device veth1_vlan entered promiscuous mode
[  272.142259][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[  272.151349][ T8070] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
20:18:21 executing program 3:
perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x44f4}, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff)
mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0)
ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000380))
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0)
writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="280000001e0009020000000000000000000000009416345d9ff85bba11ce95ee2ce4000000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n', @ANYRES32=0x0, @ANYBLOB], 0x28}}, 0x0)
sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000000c0), 0xc, 0x0}, 0x0)
openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x0, 0x0)
write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0)
fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x4)
sendmsg$IPCTNL_MSG_CT_GET_DYING(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000280)={&(0x7f0000000100)={0x14, 0x6, 0x1, 0x3, 0x0, 0x0, {0x3}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20004000}, 0x2404c000)

[  272.303596][    C0] hrtimer: interrupt took 45781 ns
[  272.401519][ T7375] device veth0_macvtap entered promiscuous mode
[  272.468836][ T7129] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[  272.508275][ T7129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[  272.524253][ T7129] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[  272.551438][ T7375] device veth1_macvtap entered promiscuous mode
20:18:22 executing program 4:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_TXQLEN={0x8}]}, 0x50}}, 0x0)

[  272.606296][ T7375] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[  272.659929][ T7375] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  272.693034][ T7375] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[  272.707909][ T7375] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  272.729473][ T7375] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[  272.741216][ T7375] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  272.759208][ T7375] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[  272.770793][ T7375] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  272.788062][ T7375] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0
[  272.799525][ T7375] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  272.837985][ T7375] batman_adv: batadv0: Interface activated: batadv_slave_0
[  272.880026][ T2562] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[  272.894268][ T2562] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[  272.922560][ T7375] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[  272.943110][ T7375] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  272.973029][ T7375] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[  273.003009][ T7375] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  273.012887][ T7375] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[  273.029653][ T7375] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  273.049023][ T7375] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[  273.081448][ T7375] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  273.091538][ T7375] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1
[  273.111352][ T7375] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  273.125736][ T7375] batman_adv: batadv0: Interface activated: batadv_slave_1
[  273.151972][ T7975] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[  273.161049][ T7975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
20:18:23 executing program 5:
open(0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
bind(0xffffffffffffffff, 0x0, 0x0)
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3)
ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000100))

20:18:23 executing program 0:
r0 = socket$inet6(0xa, 0x401000000001, 0x0)
r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r1, 0x0)
close(r0)
syz_open_procfs(0x0, &(0x7f0000000400)='comm\x00')
sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, 0x0, 0x10)
r2 = open(&(0x7f0000000100)='./bus\x00', 0x1070642, 0x0)
r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
ftruncate(r3, 0x208200)
sendfile(r0, r2, 0x0, 0x8000fffffffe)
socket$inet6_tcp(0xa, 0x1, 0x0)

20:18:23 executing program 1:
r0 = socket$inet6(0xa, 0x1, 0x0)
setsockopt$inet6_int(r0, 0x29, 0x48, &(0x7f0000000040)=0x5, 0x4)
sendto$inet6(r0, 0x0, 0x0, 0x2000c001, &(0x7f0000000140)={0xa, 0x0, 0x0, @private0}, 0x1c)

20:18:23 executing program 2:
open(&(0x7f0000000040)='./bus\x00', 0x151442, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000009, 0x50, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0)
getdents64(r0, &(0x7f0000000000)=""/112, 0x70)
r1 = socket(0x11, 0x800000003, 0x0)
r2 = socket(0x28, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x0, 0x3, 0x0, {0xa, 0x8, 0x0, @remote, 0xff}}}, 0x80)
setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x3, 0x1, @link_local}, 0x10)
splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0)
ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000140)=0x4)
ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0)
r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000080)=0x3)
dup2(r3, r4)
getdents(0xffffffffffffffff, &(0x7f0000000ea9)=""/407, 0x197)

20:18:23 executing program 3:
perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x44f4}, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff)
mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0)
ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000380))
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0)
writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="280000001e0009020000000000000000000000009416345d9ff85bba11ce95ee2ce4000000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n', @ANYRES32=0x0, @ANYBLOB], 0x28}}, 0x0)
sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000000c0), 0xc, 0x0}, 0x0)
openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x0, 0x0)
write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0)
fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x4)
sendmsg$IPCTNL_MSG_CT_GET_DYING(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000280)={&(0x7f0000000100)={0x14, 0x6, 0x1, 0x3, 0x0, 0x0, {0x3}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20004000}, 0x2404c000)

20:18:23 executing program 4:
perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x76, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
nanosleep(&(0x7f0000000040)={0x0, 0x989680}, &(0x7f00000000c0))

20:18:23 executing program 1:
r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0)
fcntl$setstatus(r0, 0x4, 0x98428d57a99b5f44)
creat(&(0x7f0000000040)='./file0/file0\x00', 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-arm64-ce\x00'}, 0x58)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000b00)={0x1c, 0x17, 0x101, 0x0, 0x0, {0x4}, [@typed={0x8}]}, 0x1c}}, 0x0)

20:18:23 executing program 0:
r0 = syz_open_dev$tty20(0xc, 0x4, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, <r2=>0x0}, &(0x7f0000cab000)=0xc)
setreuid(0x0, r2)
ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f00000000c0))

20:18:23 executing program 4:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10)
sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10)
r1 = gettid()
ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=r1)
open(0x0, 0x0, 0x0)
recvfrom(r0, &(0x7f0000000480)=""/110, 0xfffffe32, 0x700, 0x0, 0xffffffffffffff39)

20:18:23 executing program 3:
perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x44f4}, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff)
mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0)
ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000380))
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0)
writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="280000001e0009020000000000000000000000009416345d9ff85bba11ce95ee2ce4000000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n', @ANYRES32=0x0, @ANYBLOB], 0x28}}, 0x0)
sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000000c0), 0xc, 0x0}, 0x0)
openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x0, 0x0)
write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0)
fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x4)
sendmsg$IPCTNL_MSG_CT_GET_DYING(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000280)={&(0x7f0000000100)={0x14, 0x6, 0x1, 0x3, 0x0, 0x0, {0x3}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20004000}, 0x2404c000)

20:18:23 executing program 1:
clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000040)={0x2, 0x4, 0x7fff, 0x75, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x40)
r0 = memfd_create(&(0x7f0000000080)='/dev/aats\x00', 0x0)
mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r0, 0x0)
rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000))
syz_open_procfs(0x0, &(0x7f00000000c0)='fd\x00')
prctl$PR_SET_DUMPABLE(0x4, 0x0)
syz_open_procfs(0x0, &(0x7f00000002c0)='net/udplite6\x00')

[  273.827156][ T8188] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based  firewall rule not found. Use the iptables CT target to attach helpers instead.
20:18:23 executing program 5:
clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
exit_group(0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
mkdir(&(0x7f00000001c0)='./file0/file0\x00', 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
faccessat(r0, &(0x7f0000000300)='./file0\x00', 0x2)

20:18:23 executing program 0:
clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
exit_group(0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x138)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0)
mkdir(&(0x7f00000001c0)='./file0/file0\x00', 0x0)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0)
mlockall(0x0)
mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0, 0x0)
mount$bpf(0x20000000, 0x0, 0x0, 0xc5044, 0x0)
mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x5890, 0x0)
umount2(&(0x7f0000000180)='./file0\x00', 0x3)
setuid(0x0)
setxattr$security_capability(&(0x7f0000000380)='./file0/file0/file0\x00', 0x0, &(0x7f0000000500)=@v3={0x3000000, [{0x81}, {0x3}]}, 0x18, 0x3)
mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000480)='btrfs.')
openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0)

20:18:23 executing program 2:
open(&(0x7f0000000040)='./bus\x00', 0x151442, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000009, 0x50, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0)
getdents64(r0, &(0x7f0000000000)=""/112, 0x70)
r1 = socket(0x11, 0x800000003, 0x0)
r2 = socket(0x28, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x0, 0x3, 0x0, {0xa, 0x8, 0x0, @remote, 0xff}}}, 0x80)
setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x3, 0x1, @link_local}, 0x10)
splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0)
ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000140)=0x4)
ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0)
r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000080)=0x3)
dup2(r3, r4)
getdents(0xffffffffffffffff, &(0x7f0000000ea9)=""/407, 0x197)

20:18:23 executing program 3:
perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x44f4}, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff)
mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0)
ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000380))
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0)
writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="280000001e0009020000000000000000000000009416345d9ff85bba11ce95ee2ce4000000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n', @ANYRES32=0x0, @ANYBLOB], 0x28}}, 0x0)
sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000000c0), 0xc, 0x0}, 0x0)
openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x0, 0x0)
write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0)
fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x4)
sendmsg$IPCTNL_MSG_CT_GET_DYING(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000280)={&(0x7f0000000100)={0x14, 0x6, 0x1, 0x3, 0x0, 0x0, {0x3}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20004000}, 0x2404c000)

20:18:23 executing program 1:
clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000040)={0x2, 0x4, 0x7fff, 0x75, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x40)
r0 = memfd_create(&(0x7f0000000080)='/dev/aats\x00', 0x0)
mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r0, 0x0)
rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000))
syz_open_procfs(0x0, &(0x7f00000000c0)='fd\x00')
prctl$PR_SET_DUMPABLE(0x4, 0x0)
syz_open_procfs(0x0, &(0x7f00000002c0)='net/udplite6\x00')

20:18:23 executing program 5:
open(&(0x7f0000000040)='./bus\x00', 0x151442, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000009, 0x50, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0)
getdents64(r0, &(0x7f0000000000)=""/112, 0x70)
r1 = socket(0x11, 0x800000003, 0x0)
r2 = socket(0x28, 0x800000003, 0x0)
bind(r2, &(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x0, 0x3, 0x0, {0xa, 0x8, 0x0, @remote, 0xff}}}, 0x80)
setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x3, 0x1, @link_local}, 0x10)
splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0)
ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000140)=0x4)
ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0)
r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000080)=0x3)
dup2(r3, r4)
getdents(0xffffffffffffffff, &(0x7f0000000ea9)=""/407, 0x197)

20:18:24 executing program 1:
clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000040)={0x2, 0x4, 0x7fff, 0x75, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x40)
r0 = memfd_create(&(0x7f0000000080)='/dev/aats\x00', 0x0)
mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r0, 0x0)
rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000))
syz_open_procfs(0x0, &(0x7f00000000c0)='fd\x00')
prctl$PR_SET_DUMPABLE(0x4, 0x0)
syz_open_procfs(0x0, &(0x7f00000002c0)='net/udplite6\x00')

20:18:24 executing program 2:
r0 = socket$unix(0x1, 0x2, 0x0)
r1 = socket$unix(0x1, 0x2, 0x0)
close(0xffffffffffffffff)
bind$unix(r1, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e)
connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e)
r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
dup2(r2, r1)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmmsg(r0, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x0)

20:18:24 executing program 0:
perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab70, &(0x7f0000000100)=[{&(0x7f00000000c0)="0a02014d3804000019000300e6007d006c00007a000000000100000001000000004000000040000080000000", 0x2c}], 0x4801, 0x0)

20:18:24 executing program 4:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @dev}, 0x10)
sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10)
r1 = gettid()
ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=r1)
open(0x0, 0x0, 0x0)
recvfrom(r0, &(0x7f0000000480)=""/110, 0xfffffe32, 0x700, 0x0, 0xffffffffffffff39)

20:18:24 executing program 3:
r0 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_int(r0, 0x107, 0xc, &(0x7f00000000c0)=0xdd4af090, 0x4)

20:18:24 executing program 5:
perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x7e, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x250, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc)

20:18:24 executing program 2:
r0 = socket$unix(0x1, 0x2, 0x0)
r1 = socket$unix(0x1, 0x2, 0x0)
close(0xffffffffffffffff)
bind$unix(r1, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e)
connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e)
r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
dup2(r2, r1)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmmsg(r0, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x0)

20:18:24 executing program 1:
clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000040)={0x2, 0x4, 0x7fff, 0x75, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x40)
r0 = memfd_create(&(0x7f0000000080)='/dev/aats\x00', 0x0)
mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r0, 0x0)
rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000))
syz_open_procfs(0x0, &(0x7f00000000c0)='fd\x00')
prctl$PR_SET_DUMPABLE(0x4, 0x0)
syz_open_procfs(0x0, &(0x7f00000002c0)='net/udplite6\x00')

20:18:24 executing program 3:
clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
exit_group(0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syz_open_procfs(0x0, 0x0)

20:18:24 executing program 1:
clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000040)={0x2, 0x4, 0x7fff, 0x75, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x40)
r0 = memfd_create(&(0x7f0000000080)='/dev/aats\x00', 0x0)
mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r0, 0x0)
rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000))
syz_open_procfs(0x0, &(0x7f00000000c0)='fd\x00')
syz_open_procfs(0x0, &(0x7f00000002c0)='net/udplite6\x00')

20:18:24 executing program 2:
r0 = socket$unix(0x1, 0x2, 0x0)
r1 = socket$unix(0x1, 0x2, 0x0)
close(0xffffffffffffffff)
bind$unix(r1, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e)
connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e)
r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
dup2(r2, r1)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmmsg(r0, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x0)

20:18:24 executing program 5:
mkdir(&(0x7f00000002c0)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0)
chdir(&(0x7f0000000280)='./file0\x00')
r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0)
r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r1)
ftruncate(r0, 0x208200)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0)
read(r2, &(0x7f0000000180)=""/19, 0xfffffe47)
socket$inet6_tcp(0xa, 0x1, 0x0)

20:18:24 executing program 2:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = gettid()
process_vm_writev(r0, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x3de, &(0x7f0000c22fa0)=[{&(0x7f0000000040)=""/15, 0x2d77744}], 0x1, 0x0)
r1 = getpgrp(r0)
ptrace$peek(0x2, r1, &(0x7f0000000200))
clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000040)={0x6, 0x4, 0x7fff, 0x6e, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x2}, 0x40)
r2 = memfd_create(&(0x7f0000000080)='/dev/aats\x00', 0x0)
syz_open_dev$tty1(0xc, 0x4, 0x4)
mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r2, 0x0)
rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000))
pipe(&(0x7f0000000040)={<r3=>0xffffffffffffffff})
r4 = dup(0xffffffffffffffff)
ioctl$MON_IOCQ_URB_LEN(r4, 0x9201)
pipe(&(0x7f0000000040)={0xffffffffffffffff, <r5=>0xffffffffffffffff})
write$binfmt_misc(r5, 0x0, 0xff2b)
getpeername$netlink(r3, 0x0, &(0x7f0000000140))
syz_open_procfs(0x0, &(0x7f00000000c0)='fd\x00')
prctl$PR_SET_DUMPABLE(0x4, 0x0)
syz_open_procfs(0x0, 0x0)

20:18:24 executing program 3:
r0 = socket$unix(0x1, 0x2, 0x0)
ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000001c0)=0xffffffffffffffff)
ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000010c0))

20:18:25 executing program 0:
perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab70, &(0x7f0000000100)=[{&(0x7f00000000c0)="0a02014d3804000019000300e6007d006c00007a000000000100000001000000004000000040000080000000", 0x2c}], 0x4801, 0x0)

20:18:25 executing program 4:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_GROUP={0x8}]}, 0x50}}, 0x0)

20:18:25 executing program 1:
clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000040)={0x2, 0x4, 0x7fff, 0x75, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x40)
r0 = memfd_create(&(0x7f0000000080)='/dev/aats\x00', 0x0)
mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r0, 0x0)
rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000))
syz_open_procfs(0x0, &(0x7f00000000c0)='fd\x00')
syz_open_procfs(0x0, &(0x7f00000002c0)='net/udplite6\x00')

20:18:25 executing program 3:
r0 = syz_open_dev$tty1(0xc, 0x4, 0x1)
ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000000)={0x7ff, 0x5541})

20:18:25 executing program 2:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = gettid()
process_vm_writev(r0, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x3de, &(0x7f0000c22fa0)=[{&(0x7f0000000040)=""/15, 0x2d77744}], 0x1, 0x0)
r1 = getpgrp(r0)
ptrace$peek(0x2, r1, &(0x7f0000000200))
clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000040)={0x6, 0x4, 0x7fff, 0x6e, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x2}, 0x40)
r2 = memfd_create(&(0x7f0000000080)='/dev/aats\x00', 0x0)
syz_open_dev$tty1(0xc, 0x4, 0x4)
mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r2, 0x0)
rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000))
pipe(&(0x7f0000000040)={<r3=>0xffffffffffffffff})
r4 = dup(0xffffffffffffffff)
ioctl$MON_IOCQ_URB_LEN(r4, 0x9201)
pipe(&(0x7f0000000040)={0xffffffffffffffff, <r5=>0xffffffffffffffff})
write$binfmt_misc(r5, 0x0, 0xff2b)
getpeername$netlink(r3, 0x0, &(0x7f0000000140))
syz_open_procfs(0x0, &(0x7f00000000c0)='fd\x00')
prctl$PR_SET_DUMPABLE(0x4, 0x0)
syz_open_procfs(0x0, 0x0)

20:18:25 executing program 3:
clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
exit_group(0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0)
mkdir(&(0x7f00000001c0)='./file0/file0\x00', 0x0)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0)
mlockall(0x0)
mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0)
mount$bpf(0x20000000, 0x0, 0x0, 0xc5044, 0x0)
mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x5890, 0x0)
umount2(&(0x7f0000000180)='./file0\x00', 0x3)
setuid(0x0)
setxattr$security_capability(&(0x7f0000000380)='./file0/file0/file0\x00', &(0x7f00000004c0)='security.capability\x00', 0x0, 0x0, 0x0)
mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2e2d66696c651100"], &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0)
openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0)

20:18:25 executing program 1:
clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000040)={0x2, 0x4, 0x7fff, 0x75, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x40)
r0 = memfd_create(&(0x7f0000000080)='/dev/aats\x00', 0x0)
mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r0, 0x0)
rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000))
syz_open_procfs(0x0, &(0x7f00000000c0)='fd\x00')
syz_open_procfs(0x0, &(0x7f00000002c0)='net/udplite6\x00')

20:18:25 executing program 5:
perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x44f4}, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff)
mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0)
ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000380))
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0)
writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1)
sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0)
sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000000c0), 0xc, 0x0}, 0x0)
openat$uhid(0xffffffffffffff9c, &(0x7f0000000640)='/dev/uhid\x00', 0x0, 0x0)
write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0)
fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x4)
sendmsg$IPCTNL_MSG_CT_GET_DYING(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x20004000}, 0x2404c000)

20:18:25 executing program 4:
pipe(&(0x7f0000000300)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
socket$netlink(0x10, 0x3, 0x0)
writev(r1, &(0x7f0000000040)=[{&(0x7f0000000280)="390000001100090468fe0700000000000700ff3f0800000045000e070000001419001a00", 0x24}], 0x1)
write$binfmt_misc(r1, &(0x7f0000001180)=ANY=[@ANYRES16=r2, @ANYBLOB='B'], 0x15)
splice(r0, 0x0, r2, 0x0, 0x19404, 0x0)

20:18:26 executing program 2:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = gettid()
process_vm_writev(r0, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x3de, &(0x7f0000c22fa0)=[{&(0x7f0000000040)=""/15, 0x2d77744}], 0x1, 0x0)
r1 = getpgrp(r0)
ptrace$peek(0x2, r1, &(0x7f0000000200))
clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000040)={0x6, 0x4, 0x7fff, 0x6e, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x2}, 0x40)
r2 = memfd_create(&(0x7f0000000080)='/dev/aats\x00', 0x0)
syz_open_dev$tty1(0xc, 0x4, 0x4)
mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r2, 0x0)
rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000))
pipe(&(0x7f0000000040)={<r3=>0xffffffffffffffff})
r4 = dup(0xffffffffffffffff)
ioctl$MON_IOCQ_URB_LEN(r4, 0x9201)
pipe(&(0x7f0000000040)={0xffffffffffffffff, <r5=>0xffffffffffffffff})
write$binfmt_misc(r5, 0x0, 0xff2b)
getpeername$netlink(r3, 0x0, &(0x7f0000000140))
syz_open_procfs(0x0, &(0x7f00000000c0)='fd\x00')
prctl$PR_SET_DUMPABLE(0x4, 0x0)
syz_open_procfs(0x0, 0x0)

20:18:26 executing program 4:
r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0)
fcntl$setstatus(r0, 0x4, 0x98428d57a99b5f44)
creat(&(0x7f0000000040)='./file0/file0\x00', 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-arm64-ce\x00'}, 0x58)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000b00)={0x1c, 0x17, 0x101, 0x0, 0x0, {0x4}, [@typed={0x8}]}, 0x1c}}, 0x0)

20:18:26 executing program 1:
clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000040)={0x2, 0x4, 0x7fff, 0x75, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x40)
r0 = memfd_create(&(0x7f0000000080)='/dev/aats\x00', 0x0)
mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r0, 0x0)
rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000))
prctl$PR_SET_DUMPABLE(0x4, 0x0)
syz_open_procfs(0x0, &(0x7f00000002c0)='net/udplite6\x00')

20:18:26 executing program 0:
perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab70, &(0x7f0000000100)=[{&(0x7f00000000c0)="0a02014d3804000019000300e6007d006c00007a000000000100000001000000004000000040000080000000", 0x2c}], 0x4801, 0x0)

20:18:26 executing program 5:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1b)
ioctl$TIOCSLCKTRMIOS(r0, 0x5457, 0x0)

20:18:26 executing program 3:
clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
exit_group(0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0)
mkdir(&(0x7f00000001c0)='./file0/file0\x00', 0x0)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0)
mlockall(0x0)
mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0)
mount$bpf(0x20000000, 0x0, 0x0, 0xc5044, 0x0)
mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x5890, 0x0)
umount2(&(0x7f0000000180)='./file0\x00', 0x3)
setuid(0x0)
setxattr$security_capability(&(0x7f0000000380)='./file0/file0/file0\x00', &(0x7f00000004c0)='security.capability\x00', 0x0, 0x0, 0x0)
mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2e2d66696c651100"], &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0)
openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0)

20:18:26 executing program 2:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = gettid()
process_vm_writev(r0, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x3de, &(0x7f0000c22fa0)=[{&(0x7f0000000040)=""/15, 0x2d77744}], 0x1, 0x0)
r1 = getpgrp(r0)
ptrace$peek(0x2, r1, &(0x7f0000000200))
clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000040)={0x6, 0x4, 0x7fff, 0x6e, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x2}, 0x40)
r2 = memfd_create(&(0x7f0000000080)='/dev/aats\x00', 0x0)
syz_open_dev$tty1(0xc, 0x4, 0x4)
mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r2, 0x0)
rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000))
pipe(&(0x7f0000000040)={<r3=>0xffffffffffffffff})
r4 = dup(0xffffffffffffffff)
ioctl$MON_IOCQ_URB_LEN(r4, 0x9201)
pipe(&(0x7f0000000040)={0xffffffffffffffff, <r5=>0xffffffffffffffff})
write$binfmt_misc(r5, 0x0, 0xff2b)
getpeername$netlink(r3, 0x0, &(0x7f0000000140))
syz_open_procfs(0x0, &(0x7f00000000c0)='fd\x00')
prctl$PR_SET_DUMPABLE(0x4, 0x0)
syz_open_procfs(0x0, 0x0)

20:18:26 executing program 4:
clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
exit_group(0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0)
mkdir(&(0x7f00000001c0)='./file0/file0\x00', 0x0)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0)
mlockall(0x0)
mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0)
mount$bpf(0x20000000, 0x0, 0x0, 0xc5044, 0x0)
mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x5890, 0x0)
umount2(&(0x7f0000000180)='./file0\x00', 0x3)
setuid(0x0)
setxattr$security_capability(&(0x7f0000000380)='./file0/file0/file0\x00', &(0x7f00000004c0)='security.capability\x00', 0x0, 0x0, 0x0)
mount(&(0x7f0000000240)=ANY=[@ANYBLOB="2e2d66696c651100"], &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0)
openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0)

20:18:26 executing program 1:
clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000040)={0x2, 0x4, 0x7fff, 0x75, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x40)
r0 = memfd_create(&(0x7f0000000080)='/dev/aats\x00', 0x0)
mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r0, 0x0)
rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000))
prctl$PR_SET_DUMPABLE(0x4, 0x0)
syz_open_procfs(0x0, &(0x7f00000002c0)='net/udplite6\x00')

20:18:26 executing program 5:
perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x44, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)

20:18:27 executing program 1:
clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000040)={0x2, 0x4, 0x7fff, 0x75, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x40)
r0 = memfd_create(&(0x7f0000000080)='/dev/aats\x00', 0x0)
mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r0, 0x0)
rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000))
prctl$PR_SET_DUMPABLE(0x4, 0x0)
syz_open_procfs(0x0, &(0x7f00000002c0)='net/udplite6\x00')

20:18:27 executing program 3:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
syslog(0xa, 0x0, 0x0)

20:18:27 executing program 1:
clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000040)={0x2, 0x4, 0x7fff, 0x75, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x40)
r0 = memfd_create(&(0x7f0000000080)='/dev/aats\x00', 0x0)
mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r0, 0x0)
syz_open_procfs(0x0, &(0x7f00000000c0)='fd\x00')
prctl$PR_SET_DUMPABLE(0x4, 0x0)
syz_open_procfs(0x0, &(0x7f00000002c0)='net/udplite6\x00')

20:18:27 executing program 2:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = gettid()
process_vm_writev(r0, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x3de, &(0x7f0000c22fa0)=[{&(0x7f0000000040)=""/15, 0x2d77744}], 0x1, 0x0)
r1 = getpgrp(r0)
ptrace$peek(0x2, r1, &(0x7f0000000200))
clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000040)={0x6, 0x4, 0x7fff, 0x6e, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x2}, 0x40)
r2 = memfd_create(&(0x7f0000000080)='/dev/aats\x00', 0x0)
syz_open_dev$tty1(0xc, 0x4, 0x4)
mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r2, 0x0)
rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000))
pipe(&(0x7f0000000040)={<r3=>0xffffffffffffffff})
r4 = dup(0xffffffffffffffff)
ioctl$MON_IOCQ_URB_LEN(r4, 0x9201)
pipe(&(0x7f0000000040)={0xffffffffffffffff, <r5=>0xffffffffffffffff})
write$binfmt_misc(r5, 0x0, 0xff2b)
getpeername$netlink(r3, 0x0, &(0x7f0000000140))
syz_open_procfs(0x0, &(0x7f00000000c0)='fd\x00')
prctl$PR_SET_DUMPABLE(0x4, 0x0)

20:18:27 executing program 5:
perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x7e, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0)

20:18:27 executing program 0:
perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab70, &(0x7f0000000100)=[{&(0x7f00000000c0)="0a02014d3804000019000300e6007d006c00007a000000000100000001000000004000000040000080000000", 0x2c}], 0x4801, 0x0)

20:18:27 executing program 1:
clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000040)={0x2, 0x4, 0x7fff, 0x75, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x40)
r0 = memfd_create(&(0x7f0000000080)='/dev/aats\x00', 0x0)
mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r0, 0x0)
syz_open_procfs(0x0, &(0x7f00000000c0)='fd\x00')
prctl$PR_SET_DUMPABLE(0x4, 0x0)
syz_open_procfs(0x0, &(0x7f00000002c0)='net/udplite6\x00')

20:18:27 executing program 3:
perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x7e, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r1, 0x0)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2)
dup2(r0, r1)

20:18:28 executing program 1:
clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000040)={0x2, 0x4, 0x7fff, 0x75, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x40)
r0 = memfd_create(&(0x7f0000000080)='/dev/aats\x00', 0x0)
mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r0, 0x0)
syz_open_procfs(0x0, &(0x7f00000000c0)='fd\x00')
prctl$PR_SET_DUMPABLE(0x4, 0x0)
syz_open_procfs(0x0, &(0x7f00000002c0)='net/udplite6\x00')

20:18:28 executing program 4:
clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
exit_group(0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x0)
ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x34e5c)

20:18:28 executing program 2:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = gettid()
process_vm_writev(r0, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x3de, &(0x7f0000c22fa0)=[{&(0x7f0000000040)=""/15, 0x2d77744}], 0x1, 0x0)
r1 = getpgrp(r0)
ptrace$peek(0x2, r1, &(0x7f0000000200))
clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000040)={0x6, 0x4, 0x7fff, 0x6e, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x2}, 0x40)
r2 = memfd_create(&(0x7f0000000080)='/dev/aats\x00', 0x0)
syz_open_dev$tty1(0xc, 0x4, 0x4)
mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r2, 0x0)
rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000))
pipe(&(0x7f0000000040)={<r3=>0xffffffffffffffff})
r4 = dup(0xffffffffffffffff)
ioctl$MON_IOCQ_URB_LEN(r4, 0x9201)
pipe(&(0x7f0000000040)={0xffffffffffffffff, <r5=>0xffffffffffffffff})
write$binfmt_misc(r5, 0x0, 0xff2b)
getpeername$netlink(r3, 0x0, &(0x7f0000000140))
syz_open_procfs(0x0, &(0x7f00000000c0)='fd\x00')
prctl$PR_SET_DUMPABLE(0x4, 0x0)

20:18:28 executing program 5:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x401000000001, 0x0)
setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f00000000c0)="77d833ddc8a4d92af4421d534c1ed6c0", 0x10)
close(r2)

20:18:28 executing program 1:
clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000040)={0x2, 0x4, 0x7fff, 0x75, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x40)
memfd_create(&(0x7f0000000080)='/dev/aats\x00', 0x0)
rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000))
syz_open_procfs(0x0, &(0x7f00000000c0)='fd\x00')
prctl$PR_SET_DUMPABLE(0x4, 0x0)
syz_open_procfs(0x0, &(0x7f00000002c0)='net/udplite6\x00')

20:18:28 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0)
clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)

20:18:28 executing program 4:
perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x44f4}, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff)
mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000380)=[0x0, 0xcf3])
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0)
writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="280000001e0009020000000000000000000000009416345d9ff85bba11ce95ee2ce4000000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n', @ANYBLOB], 0x28}}, 0x0)
sendmsg(0xffffffffffffffff, 0x0, 0x0)
sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0)
write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0)
fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x4)
listen(0xffffffffffffffff, 0x0)
sendmsg$IPCTNL_MSG_CT_GET_DYING(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000280)={&(0x7f0000000100)={0x14, 0x6, 0x1, 0x3, 0x0, 0x0, {0x3}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20004000}, 0x2404c000)

20:18:28 executing program 3:
openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/crypto\x00', 0x0, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00')
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
preadv(r0, &(0x7f00000017c0), 0x3da, 0x0)

20:18:28 executing program 1:
clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000040)={0x2, 0x4, 0x7fff, 0x75, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x40)
memfd_create(&(0x7f0000000080)='/dev/aats\x00', 0x0)
rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000))
syz_open_procfs(0x0, &(0x7f00000000c0)='fd\x00')
prctl$PR_SET_DUMPABLE(0x4, 0x0)
syz_open_procfs(0x0, &(0x7f00000002c0)='net/udplite6\x00')

[  278.806048][ T8414] IPVS: ftp: loaded support on port[0] = 21
20:18:28 executing program 0:
perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab70, &(0x7f0000000100)=[{&(0x7f00000000c0)="0a02014d3804000019000300e6007d006c00007a000000000100000001000000004000000040000080000000", 0x2c}], 0x4801, 0x0)

20:18:28 executing program 2:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = gettid()
process_vm_writev(r0, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x3de, &(0x7f0000c22fa0)=[{&(0x7f0000000040)=""/15, 0x2d77744}], 0x1, 0x0)
r1 = getpgrp(r0)
ptrace$peek(0x2, r1, &(0x7f0000000200))
clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000040)={0x6, 0x4, 0x7fff, 0x6e, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x2}, 0x40)
r2 = memfd_create(&(0x7f0000000080)='/dev/aats\x00', 0x0)
syz_open_dev$tty1(0xc, 0x4, 0x4)
mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r2, 0x0)
rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000))
pipe(&(0x7f0000000040)={<r3=>0xffffffffffffffff})
r4 = dup(0xffffffffffffffff)
ioctl$MON_IOCQ_URB_LEN(r4, 0x9201)
pipe(&(0x7f0000000040)={0xffffffffffffffff, <r5=>0xffffffffffffffff})
write$binfmt_misc(r5, 0x0, 0xff2b)
getpeername$netlink(r3, 0x0, &(0x7f0000000140))
syz_open_procfs(0x0, &(0x7f00000000c0)='fd\x00')

20:18:28 executing program 1:
clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000040)={0x2, 0x4, 0x7fff, 0x75, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x40)
memfd_create(&(0x7f0000000080)='/dev/aats\x00', 0x0)
rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000))
syz_open_procfs(0x0, &(0x7f00000000c0)='fd\x00')
prctl$PR_SET_DUMPABLE(0x4, 0x0)
syz_open_procfs(0x0, &(0x7f00000002c0)='net/udplite6\x00')

20:18:28 executing program 4:
perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x44f4}, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000140)='./file0\x00', 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff)
mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0xa51000, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000380)=[0x0, 0xcf3])
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0)
writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="280000001e0009020000000000000000000000009416345d9ff85bba11ce95ee2ce4000000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n', @ANYBLOB], 0x28}}, 0x0)
sendmsg(0xffffffffffffffff, 0x0, 0x0)
sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0)
write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0)
fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x4)
listen(0xffffffffffffffff, 0x0)
sendmsg$IPCTNL_MSG_CT_GET_DYING(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000280)={&(0x7f0000000100)={0x14, 0x6, 0x1, 0x3, 0x0, 0x0, {0x3}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20004000}, 0x2404c000)

20:18:28 executing program 3:
open(0x0, 0x151442, 0x0)
r0 = open(0x0, 0x280c00, 0x0)
mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x3000009, 0x50, r0, 0x0)
perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/112, 0x70)
r1 = socket(0x28, 0x800000003, 0x0)
bind(r1, &(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x2, 0x3, 0x0, {0xa, 0x8, 0x6, @remote, 0xff}}}, 0x80)
setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x3, 0x1, @link_local}, 0x10)
splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x7fffffff, 0x0)
ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000140)=0x4)
ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0)
r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x3)
dup2(r2, r3)

20:18:28 executing program 1:
clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000040)={0x2, 0x4, 0x7fff, 0x75, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x40)
mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, 0xffffffffffffffff, 0x0)
rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000))
syz_open_procfs(0x0, &(0x7f00000000c0)='fd\x00')
prctl$PR_SET_DUMPABLE(0x4, 0x0)
syz_open_procfs(0x0, &(0x7f00000002c0)='net/udplite6\x00')

[  279.237865][ T8451] IPVS: ftp: loaded support on port[0] = 21
[  279.372509][   T21] tipc: TX() has been purged, node left!
20:18:29 executing program 2:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = gettid()
process_vm_writev(r0, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x3de, &(0x7f0000c22fa0)=[{&(0x7f0000000040)=""/15, 0x2d77744}], 0x1, 0x0)
r1 = getpgrp(r0)
ptrace$peek(0x2, r1, &(0x7f0000000200))
clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000040)={0x6, 0x4, 0x7fff, 0x6e, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x2}, 0x40)
r2 = memfd_create(&(0x7f0000000080)='/dev/aats\x00', 0x0)
syz_open_dev$tty1(0xc, 0x4, 0x4)
mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r2, 0x0)
rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000))
pipe(&(0x7f0000000040)={<r3=>0xffffffffffffffff})
r4 = dup(0xffffffffffffffff)
ioctl$MON_IOCQ_URB_LEN(r4, 0x9201)
pipe(&(0x7f0000000040)={0xffffffffffffffff, <r5=>0xffffffffffffffff})
write$binfmt_misc(r5, 0x0, 0xff2b)
getpeername$netlink(r3, 0x0, &(0x7f0000000140))
syz_open_procfs(0x0, &(0x7f00000000c0)='fd\x00')

20:18:29 executing program 1:
clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000040)={0x2, 0x4, 0x7fff, 0x75, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x40)
mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, 0xffffffffffffffff, 0x0)
rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000))
syz_open_procfs(0x0, &(0x7f00000000c0)='fd\x00')
prctl$PR_SET_DUMPABLE(0x4, 0x0)
syz_open_procfs(0x0, &(0x7f00000002c0)='net/udplite6\x00')

20:18:31 executing program 5:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
fcntl$setstatus(r1, 0x4, 0x42000)
close(r0)

20:18:31 executing program 3:
perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x7e, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)

20:18:31 executing program 4:
recvmmsg(0xffffffffffffffff, &(0x7f0000001800)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}, 0x4}, {{&(0x7f0000000500)=@xdp, 0x80, &(0x7f0000001680)=[{&(0x7f0000000300)=""/242, 0xf2}, {&(0x7f00000021c0)=""/4107, 0x100b}, {&(0x7f0000001400)=""/254, 0xfe}, {&(0x7f0000001500)=""/3, 0x3}, {&(0x7f0000001540)=""/11, 0xb}, {&(0x7f0000001580)=""/196, 0xc4}], 0x6, &(0x7f0000001700)=""/204, 0xcc}, 0xd7}], 0x2, 0x22, 0x0)
r0 = gettid()
prctl$PR_SET_PTRACER(0x59616d61, r0)
perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(0xffffffffffffffff, 0xc01064bd, 0x0)
ioctl$DRM_IOCTL_MODE_DESTROYPROPBLOB(0xffffffffffffffff, 0xc00464be, 0x0)
ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, 0x0)
r1 = socket$packet(0x11, 0x3, 0x300)
clock_nanosleep(0x1, 0x1, &(0x7f00000002c0)={0x0, 0x3938700}, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0)
r2 = socket$packet(0x11, 0x2, 0x300)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'syz_tun\x00'})
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4)
setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x0, 0x8, 0x0, 0x1, 0x401}, 0x1c)
bind$packet(r1, 0x0, 0x0)
sendto$inet6(r1, &(0x7f0000000080)="03042a015c0060004003002cfff57b016d2763bd56373780398d537500e50602591f031ee616d5c0184374a7ffe4ec55e0654786a70100935ba514d40808efa000801600072fd08d49a47eff71bc4131fe4c1f99bf00a900000008d1843e770afd6e9ef5837dbd0000000053", 0x3287, 0x4000002, 0x0, 0x2ff)
socket$netlink(0x10, 0x3, 0x0)
ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @multicast2}})

20:18:31 executing program 1:
clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000040)={0x2, 0x4, 0x7fff, 0x75, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x40)
mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, 0xffffffffffffffff, 0x0)
rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000))
syz_open_procfs(0x0, &(0x7f00000000c0)='fd\x00')
prctl$PR_SET_DUMPABLE(0x4, 0x0)
syz_open_procfs(0x0, &(0x7f00000002c0)='net/udplite6\x00')

20:18:31 executing program 2:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = gettid()
process_vm_writev(r0, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x3de, &(0x7f0000c22fa0)=[{&(0x7f0000000040)=""/15, 0x2d77744}], 0x1, 0x0)
r1 = getpgrp(r0)
ptrace$peek(0x2, r1, &(0x7f0000000200))
clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000040)={0x6, 0x4, 0x7fff, 0x6e, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x2}, 0x40)
r2 = memfd_create(&(0x7f0000000080)='/dev/aats\x00', 0x0)
syz_open_dev$tty1(0xc, 0x4, 0x4)
mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r2, 0x0)
rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000))
pipe(&(0x7f0000000040)={<r3=>0xffffffffffffffff})
r4 = dup(0xffffffffffffffff)
ioctl$MON_IOCQ_URB_LEN(r4, 0x9201)
pipe(&(0x7f0000000040)={0xffffffffffffffff, <r5=>0xffffffffffffffff})
write$binfmt_misc(r5, 0x0, 0xff2b)
getpeername$netlink(r3, 0x0, &(0x7f0000000140))

20:18:31 executing program 0:
perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab70, &(0x7f0000000100)=[{&(0x7f00000000c0)="0a02014d3804000019000300e6007d006c00007a000000000100000001000000004000000040000080000000", 0x2c}], 0x4801, 0x0)

20:18:31 executing program 1:
clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='/dev/aats\x00', 0x0)
mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r0, 0x0)
rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000))
syz_open_procfs(0x0, &(0x7f00000000c0)='fd\x00')
prctl$PR_SET_DUMPABLE(0x4, 0x0)
syz_open_procfs(0x0, &(0x7f00000002c0)='net/udplite6\x00')

[  281.926680][ T8521] IPVS: ftp: loaded support on port[0] = 21
20:18:31 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
timer_create(0x2, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040))

20:18:31 executing program 1:
clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='/dev/aats\x00', 0x0)
mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r0, 0x0)
rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000))
syz_open_procfs(0x0, &(0x7f00000000c0)='fd\x00')
prctl$PR_SET_DUMPABLE(0x4, 0x0)
syz_open_procfs(0x0, &(0x7f00000002c0)='net/udplite6\x00')

20:18:31 executing program 1:
clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = memfd_create(&(0x7f0000000080)='/dev/aats\x00', 0x0)
mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r0, 0x0)
rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000))
syz_open_procfs(0x0, &(0x7f00000000c0)='fd\x00')
prctl$PR_SET_DUMPABLE(0x4, 0x0)
syz_open_procfs(0x0, &(0x7f00000002c0)='net/udplite6\x00')

20:18:31 executing program 4:
recvmmsg(0xffffffffffffffff, &(0x7f0000001800)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}, 0x4}, {{&(0x7f0000000500)=@xdp, 0x80, &(0x7f0000001680)=[{&(0x7f0000000300)=""/242, 0xf2}, {&(0x7f00000021c0)=""/4107, 0x100b}, {&(0x7f0000001400)=""/254, 0xfe}, {&(0x7f0000001500)=""/3, 0x3}, {&(0x7f0000001540)=""/11, 0xb}, {&(0x7f0000001580)=""/196, 0xc4}], 0x6, &(0x7f0000001700)=""/204, 0xcc}, 0xd7}], 0x2, 0x22, 0x0)
r0 = gettid()
prctl$PR_SET_PTRACER(0x59616d61, r0)
perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(0xffffffffffffffff, 0xc01064bd, 0x0)
ioctl$DRM_IOCTL_MODE_DESTROYPROPBLOB(0xffffffffffffffff, 0xc00464be, 0x0)
ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, 0x0)
r1 = socket$packet(0x11, 0x3, 0x300)
clock_nanosleep(0x1, 0x1, &(0x7f00000002c0)={0x0, 0x3938700}, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0)
r2 = socket$packet(0x11, 0x2, 0x300)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'syz_tun\x00'})
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4)
setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x0, 0x8, 0x0, 0x1, 0x401}, 0x1c)
bind$packet(r1, 0x0, 0x0)
sendto$inet6(r1, &(0x7f0000000080)="03042a015c0060004003002cfff57b016d2763bd56373780398d537500e50602591f031ee616d5c0184374a7ffe4ec55e0654786a70100935ba514d40808efa000801600072fd08d49a47eff71bc4131fe4c1f99bf00a900000008d1843e770afd6e9ef5837dbd0000000053", 0x3287, 0x4000002, 0x0, 0x2ff)
socket$netlink(0x10, 0x3, 0x0)
ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @multicast2}})

20:18:31 executing program 2:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = gettid()
process_vm_writev(r0, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x3de, &(0x7f0000c22fa0)=[{&(0x7f0000000040)=""/15, 0x2d77744}], 0x1, 0x0)
r1 = getpgrp(r0)
ptrace$peek(0x2, r1, &(0x7f0000000200))
clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000040)={0x6, 0x4, 0x7fff, 0x6e, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x2}, 0x40)
r2 = memfd_create(&(0x7f0000000080)='/dev/aats\x00', 0x0)
syz_open_dev$tty1(0xc, 0x4, 0x4)
mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r2, 0x0)
rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000))
pipe(&(0x7f0000000040)={<r3=>0xffffffffffffffff})
r4 = dup(0xffffffffffffffff)
ioctl$MON_IOCQ_URB_LEN(r4, 0x9201)
pipe(&(0x7f0000000040)={0xffffffffffffffff, <r5=>0xffffffffffffffff})
write$binfmt_misc(r5, 0x0, 0xff2b)
getpeername$netlink(r3, 0x0, &(0x7f0000000140))

20:18:31 executing program 1:
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000040)={0x2, 0x4, 0x7fff, 0x75, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x40)
r0 = memfd_create(&(0x7f0000000080)='/dev/aats\x00', 0x0)
mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r0, 0x0)
rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000))
syz_open_procfs(0x0, &(0x7f00000000c0)='fd\x00')
prctl$PR_SET_DUMPABLE(0x4, 0x0)
syz_open_procfs(0x0, &(0x7f00000002c0)='net/udplite6\x00')

[  282.339666][ T8521] IPVS: ftp: loaded support on port[0] = 21
[  282.424728][   T21] tipc: TX() has been purged, node left!
20:18:34 executing program 4:
perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x7e, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setitimer(0x0, 0x0, 0x0)

20:18:34 executing program 5:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
getsockopt$sock_buf(r0, 0x1, 0x3b, &(0x7f0000000140)=""/30, &(0x7f0000000180)=0x1e)

20:18:34 executing program 2:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = gettid()
process_vm_writev(r0, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x3de, &(0x7f0000c22fa0)=[{&(0x7f0000000040)=""/15, 0x2d77744}], 0x1, 0x0)
r1 = getpgrp(r0)
ptrace$peek(0x2, r1, &(0x7f0000000200))
clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000040)={0x6, 0x4, 0x7fff, 0x6e, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x2}, 0x40)
r2 = memfd_create(&(0x7f0000000080)='/dev/aats\x00', 0x0)
syz_open_dev$tty1(0xc, 0x4, 0x4)
mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r2, 0x0)
rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000))
pipe(&(0x7f0000000040)={<r3=>0xffffffffffffffff})
r4 = dup(0xffffffffffffffff)
ioctl$MON_IOCQ_URB_LEN(r4, 0x9201)
pipe(&(0x7f0000000040)={0xffffffffffffffff, <r5=>0xffffffffffffffff})
write$binfmt_misc(r5, 0x0, 0xff2b)
getpeername$netlink(r3, 0x0, &(0x7f0000000140))

20:18:34 executing program 1:
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000040)={0x2, 0x4, 0x7fff, 0x75, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x40)
r0 = memfd_create(&(0x7f0000000080)='/dev/aats\x00', 0x0)
mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r0, 0x0)
rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000))
syz_open_procfs(0x0, &(0x7f00000000c0)='fd\x00')
prctl$PR_SET_DUMPABLE(0x4, 0x0)
syz_open_procfs(0x0, &(0x7f00000002c0)='net/udplite6\x00')

20:18:34 executing program 3:
perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x7e, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)

20:18:34 executing program 0:
perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab70, &(0x7f0000000100)=[{&(0x7f00000000c0)="0a02014d3804000019000300e6007d006c00007a000000000100000001000000004000000040000080000000", 0x2c}], 0x4801, 0x0)

[  284.721414][ T8617] syz-executor.4 calls setitimer() with new_value NULL pointer. Misfeature support will be removed
20:18:34 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "4c9367c37d87a6d70c35d2bebdceda6683fef0"})

20:18:34 executing program 1:
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000040)={0x2, 0x4, 0x7fff, 0x75, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x40)
r0 = memfd_create(&(0x7f0000000080)='/dev/aats\x00', 0x0)
mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r0, 0x0)
rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000))
syz_open_procfs(0x0, &(0x7f00000000c0)='fd\x00')
prctl$PR_SET_DUMPABLE(0x4, 0x0)
syz_open_procfs(0x0, &(0x7f00000002c0)='net/udplite6\x00')

[  284.830116][ T8623] IPVS: ftp: loaded support on port[0] = 21
20:18:34 executing program 4:
perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x7e, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0)
close(r0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0)

20:18:34 executing program 2:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = gettid()
process_vm_writev(r0, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x3de, &(0x7f0000c22fa0)=[{&(0x7f0000000040)=""/15, 0x2d77744}], 0x1, 0x0)
r1 = getpgrp(r0)
ptrace$peek(0x2, r1, &(0x7f0000000200))
clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000040)={0x6, 0x4, 0x7fff, 0x6e, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x2}, 0x40)
r2 = memfd_create(&(0x7f0000000080)='/dev/aats\x00', 0x0)
syz_open_dev$tty1(0xc, 0x4, 0x4)
mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r2, 0x0)
rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000))
pipe(&(0x7f0000000040))
r3 = dup(0xffffffffffffffff)
ioctl$MON_IOCQ_URB_LEN(r3, 0x9201)
pipe(&(0x7f0000000040)={0xffffffffffffffff, <r4=>0xffffffffffffffff})
write$binfmt_misc(r4, 0x0, 0xff2b)

20:18:34 executing program 1:
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000040)={0x2, 0x4, 0x7fff, 0x75, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x40)
r0 = memfd_create(&(0x7f0000000080)='/dev/aats\x00', 0x0)
mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r0, 0x0)
rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000))
syz_open_procfs(0x0, &(0x7f00000000c0)='fd\x00')
prctl$PR_SET_DUMPABLE(0x4, 0x0)
syz_open_procfs(0x0, &(0x7f00000002c0)='net/udplite6\x00')

20:18:34 executing program 5:
clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
exit_group(0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x138)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0)
mkdir(&(0x7f00000001c0)='./file0/file0\x00', 0x0)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0)
mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0)
mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x5890, 0x0)
umount2(&(0x7f0000000180)='./file0\x00', 0x3)
openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0)

20:18:34 executing program 4:
fcntl$setstatus(0xffffffffffffffff, 0x4, 0x98428d57a99b5f44)
r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
r1 = openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$NS_GET_PARENT(r1, 0xb702, 0x0)
write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba10800800", 0x1e)
ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0))
r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0)
write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0xfd14)
write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x9)
r3 = socket$nl_generic(0x10, 0x3, 0x10)
accept$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000240)=0x1c)
sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000b00)=ANY=[@ANYBLOB="1ca0fa24e3ed3c0100000000e41300000400000008000c00"], 0x1c}}, 0x0)
syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00')

20:18:35 executing program 3:
gettid()
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0)
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0)

[  285.281848][  T171] tipc: TX() has been purged, node left!
20:18:35 executing program 2:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = gettid()
process_vm_writev(r0, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x3de, &(0x7f0000c22fa0)=[{&(0x7f0000000040)=""/15, 0x2d77744}], 0x1, 0x0)
r1 = getpgrp(r0)
ptrace$peek(0x2, r1, &(0x7f0000000200))
clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000040)={0x6, 0x4, 0x7fff, 0x6e, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x2}, 0x40)
r2 = memfd_create(&(0x7f0000000080)='/dev/aats\x00', 0x0)
syz_open_dev$tty1(0xc, 0x4, 0x4)
mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r2, 0x0)
rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000))
pipe(&(0x7f0000000040))
r3 = dup(0xffffffffffffffff)
ioctl$MON_IOCQ_URB_LEN(r3, 0x9201)
pipe(&(0x7f0000000040)={0xffffffffffffffff, <r4=>0xffffffffffffffff})
write$binfmt_misc(r4, 0x0, 0xff2b)

20:18:35 executing program 4:
r0 = socket$unix(0x1, 0x2, 0x0)
r1 = socket$unix(0x1, 0x2, 0x0)
bind$unix(r1, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e)
connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmmsg(r0, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x3ec0)

20:18:35 executing program 0:
perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab70, &(0x7f0000000100)=[{&(0x7f00000000c0)="0a02014d3804000019000300e6007d006c00007a000000000100000001000000004000000040000080000000", 0x2c}], 0x4801, 0x0)

20:18:35 executing program 5:
clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
exit_group(0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x138)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0)
mkdir(&(0x7f00000001c0)='./file0/file0\x00', 0x0)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0)
mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0)
mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x5890, 0x0)
umount2(&(0x7f0000000180)='./file0\x00', 0x3)
openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0)

20:18:35 executing program 1:
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000040)={0x2, 0x4, 0x7fff, 0x75, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x40)
r0 = memfd_create(&(0x7f0000000080)='/dev/aats\x00', 0x0)
mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r0, 0x0)
rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000))
syz_open_procfs(0x0, &(0x7f00000000c0)='fd\x00')
prctl$PR_SET_DUMPABLE(0x4, 0x0)
syz_open_procfs(0x0, &(0x7f00000002c0)='net/udplite6\x00')

20:18:35 executing program 3:
gettid()
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0)
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0)

20:18:35 executing program 3:
clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
exit_group(0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0)
mkdir(&(0x7f00000001c0)='./file0/file0\x00', 0x0)
mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0)
mlockall(0x0)
mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0)
mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0/file0\x00', 0x0, 0xc5044, 0x0)
mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x5890, 0x0)
umount2(&(0x7f0000000180)='./file0\x00', 0x3)
setuid(0x0)
setxattr$security_capability(&(0x7f0000000380)='./file0/file0/file0\x00', &(0x7f00000004c0)='security.capability\x00', 0x0, 0x0, 0x0)
mount(&(0x7f0000000240)=@filename='./file0\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0)
openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0)

20:18:35 executing program 2:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = gettid()
process_vm_writev(r0, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x3de, &(0x7f0000c22fa0)=[{&(0x7f0000000040)=""/15, 0x2d77744}], 0x1, 0x0)
r1 = getpgrp(r0)
ptrace$peek(0x2, r1, &(0x7f0000000200))
clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000040)={0x6, 0x4, 0x7fff, 0x6e, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x2}, 0x40)
r2 = memfd_create(&(0x7f0000000080)='/dev/aats\x00', 0x0)
syz_open_dev$tty1(0xc, 0x4, 0x4)
mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r2, 0x0)
rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000))
pipe(&(0x7f0000000040))
r3 = dup(0xffffffffffffffff)
ioctl$MON_IOCQ_URB_LEN(r3, 0x9201)
pipe(&(0x7f0000000040)={0xffffffffffffffff, <r4=>0xffffffffffffffff})
write$binfmt_misc(r4, 0x0, 0xff2b)

20:18:35 executing program 1:
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000040)={0x2, 0x4, 0x7fff, 0x75, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x40)
r0 = memfd_create(&(0x7f0000000080)='/dev/aats\x00', 0x0)
mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r0, 0x0)
rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000))
syz_open_procfs(0x0, &(0x7f00000000c0)='fd\x00')
prctl$PR_SET_DUMPABLE(0x4, 0x0)
syz_open_procfs(0x0, &(0x7f00000002c0)='net/udplite6\x00')

20:18:35 executing program 4:
r0 = socket$unix(0x1, 0x2, 0x0)
r1 = socket$unix(0x1, 0x2, 0x0)
bind$unix(r1, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e)
connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmmsg(r0, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x3ec0)

20:18:35 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$netlink(0x10, 0x3, 0x1)

20:18:36 executing program 4:
r0 = socket$unix(0x1, 0x2, 0x0)
r1 = socket$unix(0x1, 0x2, 0x0)
bind$unix(r1, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e)
connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmmsg(r0, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x3ec0)

20:18:36 executing program 1:
clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
bpf$MAP_CREATE(0xc00000000000000, 0x0, 0x0)
r0 = memfd_create(&(0x7f0000000080)='/dev/aats\x00', 0x0)
mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r0, 0x0)
rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000))
syz_open_procfs(0x0, &(0x7f00000000c0)='fd\x00')
prctl$PR_SET_DUMPABLE(0x4, 0x0)
syz_open_procfs(0x0, &(0x7f00000002c0)='net/udplite6\x00')

20:18:36 executing program 2:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = gettid()
process_vm_writev(r0, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x3de, &(0x7f0000c22fa0)=[{&(0x7f0000000040)=""/15, 0x2d77744}], 0x1, 0x0)
r1 = getpgrp(r0)
ptrace$peek(0x2, r1, &(0x7f0000000200))
clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000040)={0x6, 0x4, 0x7fff, 0x6e, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x2}, 0x40)
r2 = memfd_create(&(0x7f0000000080)='/dev/aats\x00', 0x0)
syz_open_dev$tty1(0xc, 0x4, 0x4)
mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r2, 0x0)
rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000))
pipe(&(0x7f0000000040)={<r3=>0xffffffffffffffff})
r4 = dup(0xffffffffffffffff)
ioctl$MON_IOCQ_URB_LEN(r4, 0x9201)
pipe(&(0x7f0000000040))
getpeername$netlink(r3, 0x0, &(0x7f0000000140))

20:18:36 executing program 0:
perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab70, &(0x7f0000000100)=[{&(0x7f00000000c0)="0a02014d3804000019000300e6007d006c00007a000000000100000001000000004000000040000080000000", 0x2c}], 0x4801, 0x0)

20:18:36 executing program 1:
clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
bpf$MAP_CREATE(0xc00000000000000, 0x0, 0x0)
r0 = memfd_create(&(0x7f0000000080)='/dev/aats\x00', 0x0)
mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r0, 0x0)
rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000))
syz_open_procfs(0x0, &(0x7f00000000c0)='fd\x00')
prctl$PR_SET_DUMPABLE(0x4, 0x0)
syz_open_procfs(0x0, &(0x7f00000002c0)='net/udplite6\x00')

20:18:36 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3)
ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000100))

20:18:36 executing program 3:
perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x7e, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x4, &(0x7f0000000740)=[{0x0, 0x0, 0xffff}, {0x0}, {&(0x7f0000000480)}, {0x0}])

20:18:36 executing program 5:
clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
exit_group(0x0)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}})

20:18:36 executing program 2:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = gettid()
process_vm_writev(r0, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x3de, &(0x7f0000c22fa0)=[{&(0x7f0000000040)=""/15, 0x2d77744}], 0x1, 0x0)
r1 = getpgrp(r0)
ptrace$peek(0x2, r1, &(0x7f0000000200))
clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000040)={0x6, 0x4, 0x7fff, 0x6e, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x2}, 0x40)
r2 = memfd_create(&(0x7f0000000080)='/dev/aats\x00', 0x0)
syz_open_dev$tty1(0xc, 0x4, 0x4)
mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r2, 0x0)
rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000))
pipe(&(0x7f0000000040)={<r3=>0xffffffffffffffff})
r4 = dup(0xffffffffffffffff)
ioctl$MON_IOCQ_URB_LEN(r4, 0x9201)
pipe(&(0x7f0000000040))
getpeername$netlink(r3, 0x0, &(0x7f0000000140))

20:18:36 executing program 1:
clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
bpf$MAP_CREATE(0xc00000000000000, 0x0, 0x0)
r0 = memfd_create(&(0x7f0000000080)='/dev/aats\x00', 0x0)
mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x2000005, 0x11, r0, 0x0)
rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f0000000000))
syz_open_procfs(0x0, &(0x7f00000000c0)='fd\x00')
prctl$PR_SET_DUMPABLE(0x4, 0x0)
syz_open_procfs(0x0, &(0x7f00000002c0)='net/udplite6\x00')

20:18:36 executing program 5:
perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="0a02014d3804000019000300e6007d006c00007a000000000100000001000000004000000040000080000000", 0x2c}], 0x0, 0x0)

20:18:36 executing program 4:
perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCGETS2(r0, 0x802c542a, &(0x7f00000000c0))

[  287.219518][ T2430] ------------[ cut here ]------------
[  287.225337][ T2430] WARNING: CPU: 1 PID: 2430 at kernel/kthread.c:819 kthread_queue_work+0x16d/0x1b0
[  287.234616][ T2430] Kernel panic - not syncing: panic_on_warn set ...
[  287.241201][ T2430] CPU: 1 PID: 2430 Comm: kworker/1:1H Not tainted 5.8.0-rc4-next-20200708-syzkaller #0
[  287.250810][ T2430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  287.260959][ T2430] Workqueue: kblockd blk_mq_run_work_fn
[  287.266495][ T2430] Call Trace:
[  287.269821][ T2430]  dump_stack+0x18f/0x20d
[  287.274180][ T2430]  panic+0x2e3/0x75c
[  287.278059][ T2430]  ? __warn_printk+0xf3/0xf3
[  287.282749][ T2430]  ? printk+0xba/0xed
[  287.286748][ T2430]  ? log_store.cold+0x16/0x16
[  287.291421][ T2430]  ? __warn.cold+0x5/0x45
[  287.295742][ T2430]  ? __warn+0xd6/0x1f2
[  287.299800][ T2430]  ? kthread_queue_work+0x16d/0x1b0
[  287.304987][ T2430]  __warn.cold+0x20/0x45
[  287.309219][ T2430]  ? kthread_queue_work+0x16d/0x1b0
[  287.314402][ T2430]  report_bug+0x1bd/0x210
[  287.318782][ T2430]  handle_bug+0x38/0x90
[  287.322923][ T2430]  exc_invalid_op+0x13/0x40
[  287.327457][ T2430]  asm_exc_invalid_op+0x12/0x20
[  287.332291][ T2430] RIP: 0010:kthread_queue_work+0x16d/0x1b0
[  287.338081][ T2430] Code: 0f 85 72 ff ff ff e8 62 49 26 00 48 8d 55 48 4c 89 e6 48 89 ef e8 63 ec ff ff 41 bc 01 00 00 00 e9 56 ff ff ff e8 43 49 26 00 <0f> 0b 45 31 e4 e9 47 ff ff ff 48 c7 c7 f4 61 af 8a e8 dd fd 65 00
[  287.357667][ T2430] RSP: 0018:ffffc90007f9f8e8 EFLAGS: 00010093
[  287.363716][ T2430] RAX: 0000000000000000 RBX: 0000000000000001 RCX: ffffffff814db478
[  287.371669][ T2430] RDX: ffff8880a0cb21c0 RSI: ffffffff814db4ed RDI: ffff8882186bf9c0
[  287.379621][ T2430] RBP: ffff8882186bf958 R08: 0000000000000001 R09: 0000000000000003
[  287.387575][ T2430] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8880a15e7128
[  287.395531][ T2430] R13: 0000000000000286 R14: ffff8882186bf960 R15: dffffc0000000000
[  287.403602][ T2430]  ? kthread_queue_work+0xf8/0x1b0
[  287.408696][ T2430]  ? kthread_queue_work+0x16d/0x1b0
[  287.413881][ T2430]  ? kthread_queue_work+0x16d/0x1b0
[  287.419131][ T2430]  loop_queue_rq+0x428/0x590
[  287.423710][ T2430]  blk_mq_dispatch_rq_list+0x2e0/0x1e40
[  287.429282][ T2430]  ? elv_rb_del+0x50/0x90
[  287.433598][ T2430]  ? blk_mq_dequeue_from_ctx+0x810/0x810
[  287.439213][ T2430]  ? do_raw_spin_unlock+0x171/0x230
[  287.444398][ T2430]  ? _raw_spin_unlock+0x24/0x40
[  287.449298][ T2430]  ? dd_dispatch_request+0x225/0x880
[  287.454574][ T2430]  __blk_mq_do_dispatch_sched+0x3bc/0x870
[  287.460285][ T2430]  ? blk_mq_sched_free_hctx_data+0x1e0/0x1e0
[  287.466272][ T2430]  ? lock_acquire+0x1f1/0xad0
[  287.470936][ T2430]  ? hctx_lock+0x7f/0x1d0
[  287.475255][ T2430]  __blk_mq_sched_dispatch_requests+0x394/0x490
[  287.481497][ T2430]  ? blk_mq_do_dispatch_ctx+0x610/0x610
[  287.487031][ T2430]  ? lock_acquire+0x1f1/0xad0
[  287.491740][ T2430]  ? process_one_work+0x85f/0x1670
[  287.496876][ T2430]  blk_mq_sched_dispatch_requests+0xfb/0x180
[  287.502850][ T2430]  __blk_mq_run_hw_queue+0x13a/0x2d0
[  287.508123][ T2430]  ? trace_block_unplug+0x300/0x300
[  287.513310][ T2430]  ? _raw_spin_unlock_irq+0x1f/0x80
[  287.518492][ T2430]  ? lock_is_held_type+0xb0/0xe0
[  287.523415][ T2430]  blk_mq_run_work_fn+0x55/0x70
[  287.528250][ T2430]  process_one_work+0x94c/0x1670
[  287.533176][ T2430]  ? lock_release+0x8d0/0x8d0
[  287.537841][ T2430]  ? pwq_dec_nr_in_flight+0x2d0/0x2d0
[  287.543199][ T2430]  ? rwlock_bug.part.0+0x90/0x90
[  287.548123][ T2430]  ? lockdep_hardirqs_off+0x66/0xa0
[  287.553315][ T2430]  worker_thread+0x64c/0x1120
[  287.557986][ T2430]  ? __kthread_parkme+0x13f/0x1e0
[  287.562993][ T2430]  ? process_one_work+0x1670/0x1670
[  287.568179][ T2430]  kthread+0x3b5/0x4a0
[  287.572230][ T2430]  ? __kthread_bind_mask+0xc0/0xc0
[  287.577323][ T2430]  ? __kthread_bind_mask+0xc0/0xc0
[  287.582493][ T2430]  ret_from_fork+0x1f/0x30
[  287.588475][ T2430] Kernel Offset: disabled
[  287.593017][ T2430] Rebooting in 86400 seconds..