00340)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=r3, @ANYRESOCT], 0x2c}, 0x1, 0x0, 0x0, 0x1}, 0x10) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x10001, 0x0) r5 = socket(0x18, 0x0, 0x0) connect$rxrpc(r5, 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000128bd700075bd16a2413a00000000000000abf133ffdbdf25010000000c000500", @ANYRES32=r4, @ANYBLOB="08000100", @ANYRES32=r5, @ANYBLOB="0c000300faffffffffffffff0c00080009000000000000000c0006000300000000000000"], 0x58}, 0x1, 0x0, 0x0, 0x4000040}, 0x841) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, r3, 0x8, 0x70bd29, 0x25dfdbfb, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0xfffffffffffff000}]}, 0x38}, 0x1, 0x0, 0x0, 0x10}, 0x51) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="100028bd7000fedbdf25010000000c0006000200018000000000"], 0x20}, 0x1, 0x0, 0x0, 0x4004110}, 0x4008040) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x0, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x1, 0x5e}, 0x0) 20:32:42 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872d2b01000000", @ANYRES32=0x0, @ANYBLOB="ff7f000000000000140012800a00010076786c616e0000000400028008000a0036459cdb26"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r1, r2, 0x0, 0x800009) r3 = openat$cgroup_ro(r2, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r3, 0x541c, &(0x7f0000000040)) 20:32:42 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:32:43 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872d2b01000000", @ANYRES32=0x0, @ANYBLOB="ff7f000000000000140012800a00010076786c616e0000000400028008000a0036459cdb26"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000580)=@newqdisc={0x2c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_mq={0x7, 0x1, 'mq\x00'}]}, 0x2c}}, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r5, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@private2={0xfc, 0x2, [], 0x1}, @in6=@local, 0x4e22, 0x8, 0x4e23, 0x6, 0xa, 0x120, 0x20, 0x87, r2, r5}, {0x4, 0x40, 0x2, 0xffffffffffffdc83, 0x81, 0x94b6, 0x1, 0x6}, {0x3, 0x1, 0x200, 0x9}, 0x817, 0x6e6bb2, 0x0, 0x1, 0x2}, {{@in6=@dev={0xfe, 0x80, [], 0x17}, 0x5, 0x33}, 0x2, @in6=@dev={0xfe, 0x80, [], 0x2b}, 0x3500, 0x2, 0x1, 0x35, 0x0, 0xe6, 0x1ff}}, 0xe8) [ 1480.048238] team0: Device ipvlan1 failed to register rx_handler 20:32:45 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872d2b01000000", @ANYRES32=0x0, @ANYBLOB="ff7f000000000000140012800a00010076786c616e0000000400028008000a0036459cdb26"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x0) 20:32:45 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x540b, 0x2) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r1, r2, 0x0, 0x800009) r3 = socket(0x11, 0x800000003, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r5, r6, 0x0, 0x800009) setsockopt$XDP_UMEM_COMPLETION_RING(r6, 0x11b, 0x6, &(0x7f00000001c0)=0x18000, 0x4) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r4, r7, 0x0, 0x800009) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r7, 0x6, 0x1d, &(0x7f0000000100), &(0x7f0000000140)=0x14) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r9 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r9, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000580)=ANY=[@ANYBLOB="2c00000024ea0236c03f2c2f1800000000000000", @ANYRES32=r8, @ANYBLOB="00000000f1ffffff00000000070001006d710000"], 0x2c}}, 0x0) unlink(&(0x7f0000000180)='./file0\x00') ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f0000000040)={@empty, @private2={0xfc, 0x2, [], 0x1}, @ipv4={[], [], @loopback}, 0x9, 0x5, 0x7, 0x0, 0x2, 0x8, r8}) 20:32:45 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_open_dev$vcsu(&(0x7f0000000040)='/dev/vcsu#\x00', 0x13616265, 0x80100) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x40, &(0x7f00000001c0)=0x6e49497f, 0x4) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r5, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400000000000000000000000a000000", @ANYRES32=0x0, @ANYBLOB="1400020000000000000000000000ffff000000000000000000aa"], 0x40}}, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$smc(&(0x7f0000000280)='SMC_PNETID\x00') sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="0100000000000000000002000000140002006272696467e4c7736c6176655f310000090001"], 0x3}}, 0x0) sendfile(r7, r6, 0x0, 0x100100000000) 20:32:45 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x800009) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r4, r5, 0x0, 0x800009) setsockopt$SO_TIMESTAMP(r4, 0x1, 0x40, &(0x7f00000001c0)=0x6e49497f, 0x4) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r6, r7, 0x0, 0x800009) r8 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r8, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r8, 0x0) r9 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ocfs2_control\x00', 0x88000, 0x0) io_submit(0x0, 0xa, &(0x7f0000000a00)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x8, 0x0, 0xffffffffffffffff, &(0x7f0000000040)="1c7843f3a0d7c40d64377d18a8229573eefc4b0f9822681cff0e5734006c3bbeb1d0aedda7c26a1c54b6f54f9b79d2071227382d9178f35a3691cbf831289815c365fe2b6d802a4ec1e572ed44c9b85ec6795e375a241bab050c8a2b54cb4a731f13ea9ae6327f41f8e198295827d1a99856b8338b9e77946ed9be8a7596a44dcfdb2a189321ea80bb50ad0151eca4aa19b83b6dabb6258dd2597851469cdb3dd2b42b79a09650f6e483848de2f2b239181caad065558c7c9df6a61e4434b3e14e26056b705c6c1e94e82ed63dbbbc1532997dd70c8a5ef144aed4dce9f04fc46363", 0xe2, 0x22e}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x6, 0x0, 0xffffffffffffffff, &(0x7f0000000200)="68a2a72f61e3a06ef9c4eab9cc714e3583a83c80d475eb13a0df1c0314a44a1d550c32b281eee7e6cb3b40a429ab6e917b7ff30f14eb30dfaed5155c6fbddefe520141f61d950b5ed5451bb98f8de0f2c6b4c3c000274d0ec7347147b903a44d38b941efc48f7cf6", 0x68, 0xbea, 0x0, 0x1}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x6, 0x83f, 0xffffffffffffffff, &(0x7f0000000140)="80f5a21702b6f5c9f68d10fc773e09df71c1b5df926a6e89421d1c0eae437171840000", 0x23, 0x1000000000003}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x2, 0xfff, 0xffffffffffffffff, &(0x7f0000000380)="6623d8746741858ffd4722ef3fc88f3693f81203d9e9666b50cd5315f00f765207d091acfdccb409e336282c60dd042128e1f1d68b313ffba09c5f8cd858aed438356cbeb4930792f5dadd861957a77f83fec77e07501dabc5dd878458aece509e62a4755b2beaaa5c7d16317170823d205271f788b03328d83e92da03d9962e8a4f501e4c10c13408eea478e1dcff", 0x8f, 0x5, 0x0, 0x3}, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x5, 0x5, r1, &(0x7f0000000480)="be625efbb167b1496a6b490de4c3deded294c2eee9f753f0953d9b89fa8ef7e6d027ad7229cfe4146257fe5dd0286bd63ca850274dcef4b288bd56c40c253f9fe62b339dbd4213099087d708308140d60394072f202f9fe27c42b58f146162f5b52957a70e5da5c734937f9def0ff882414fea2d93728a463f90c7c38032b6722b3bbdc6216ddb25937c3f8333a9cb445c35f5c654833832eb53ccb9be8e3c018130e5956609723ab1cb", 0xaa, 0x0, 0x0, 0x1, r3}, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x6, 0x0, r4, &(0x7f0000000580)="959a29a713350dc44671fa0866deb87ed71056d59f5615785450bb9b802d69d9eeade203ae6d7df964e1ac39b2c81d827997efe01a51765a1f8ba0a2c4815180dd823b9e77efc63b2eef967d77cc536f2d6eccf915982a3c00cb86fac6fc7abbcd56c766d6107ed3", 0x68, 0xffff, 0x0, 0x3, r7}, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x7, 0x0, r8, &(0x7f0000000640)="052045433304a4f319cefdb3e713e0ad178d8ca426266b5e48670d2686c56248687ff8a87271a3b71972f88424e85e3d621f2592cc6669f7a48817b2c4ae04aa343974c610be141d8b14518993a9f8943bee82228140d78cb3751b6cc6aba0bc15266a6f6e4c50d8f701bf0e1075d3843fd36a3c24cda858c30d8e919eb809d489cb3ebf6d62f6de685e3f9079a99d909629859e60e19511281c93c0", 0x9c, 0x0, 0x0, 0x2}, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x2, 0x6, r0, &(0x7f0000000740)="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", 0xfa, 0x7, 0x0, 0x1, r9}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x6, 0xffffffffffffffff, &(0x7f0000000900)="957047fd78d05bb8ab3d42f9079c2d956cbc9e30cb07e5c1dd8acd28b39dbaff0ad7530e578fcf3d37d65b9a1a5c6bcc41d90cc7e3c5d4fc7eb24fdcdd12c24f810bc4b18706656449e3b109a776290b4ef524dc843b46c4b846c1d18a326b458cd8bae5efef64b610c7f9a9b002cada72eeae77eeb20963c2e615b4d6eb49821e0a20c05666d71870527316a0899af02642e175b174d67a7b5b657429d8479142f4742d9678d783b3fb6c74f4c4e5a6e6327a45", 0xb4, 0x10000, 0x0, 0x1}, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x7, 0x2, 0xffffffffffffffff, &(0x7f0000000300)="6b7e49287f0c6aa9a7c1", 0xa, 0x71, 0x0, 0x2}]) socket$nl_netfilter(0x10, 0x3, 0xc) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') 20:32:45 executing program 0: r0 = syz_open_procfs(0x0, 0x0) r1 = gettid() r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r1) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x13098, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_timeval(r0, 0x1, 0x43, &(0x7f0000000240), &(0x7f0000000340)=0x10) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0xffff, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r3, r4, 0x0, 0x800009) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000400)={0x0, 0x9}, 0x8) setsockopt$inet_MCAST_LEAVE_GROUP(r4, 0x0, 0x2d, &(0x7f00000000c0)={0x0, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r5, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c3, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) 20:32:45 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872d2b01000000", @ANYRES32=0x0, @ANYBLOB="ff7f000000000000140012800a00010076786c616e0000000400028008000a0036459cdb26"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f0000000280)={"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"}) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 1481.976903] audit: type=1804 audit(5885209965.113:197): pid=26292 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir510076224/syzkaller.vnMEgn/1031/cgroup.controllers" dev="sda1" ino=16263 res=1 [ 1481.987604] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=59940 sclass=netlink_route_socket pid=26295 comm=syz-executor.5 20:32:45 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) ioctl$KVM_DIRTY_TLB(r3, 0x4010aeaa, &(0x7f0000000100)={0x5, 0x1}) sendfile(r0, r1, 0x0, 0x800009) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r4, r5, 0x0, 0x800009) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x80041, 0x0) setsockopt$packet_fanout(r6, 0x107, 0x12, &(0x7f0000000180)={0x0, 0x7}, 0x4) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f0000000040)={0x2, 0x9bfa, 0x1, 'queue1\x00', 0x7}) 20:32:45 executing program 0: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0xffff, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f0000000400)={0x8, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x800009) fremovexattr(0xffffffffffffffff, &(0x7f0000000240)=@random={'osx.', 'children\x00'}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:32:45 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x8000, 0x0) setsockopt$inet_buf(r0, 0x0, 0x2b, &(0x7f0000000100)="58fb8d20ce40c3c532ec0c0bbcc646474167f33012b10a076816d2b2b0168a2f307afa18c645c7c2512471e06d2de09b034e58466be63211b9f80f4846a9a1b076a17b14a3859defdf76d090c78bcb6132befe50223e4b7074c05bbe42f0268e92079ece5539879db59d13aa6a62bb8346ba85f1e69d924030808cd8031677b69bdc20006bf969a0097645dc0b011f41230a1957ad067521ac1fb2a37cd60898dad5532946c7370d358c512a0bef2b983af4f4fcf7d0f70fcb2bd7179e23395dfa8e033b7904771de1ea7e1ddd1be28e3b95cf815b7300", 0xd7) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872d2b01000000", @ANYRES32=0x0, @ANYBLOB="ff7f000000000000142012800a02010076786c616e0000000400020800000000000000db26"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 1482.179287] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=59940 sclass=netlink_route_socket pid=26295 comm=syz-executor.5 20:32:45 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioperm(0x0, 0x7, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) ioctl$SIOCRSACCEPT(r3, 0x89e3) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r5, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_SET_MP_STATE(r5, 0x4004ae99, &(0x7f0000000040)=0x2) r6 = dup3(r0, r4, 0x0) ioctl$KVM_SET_CPUID(r5, 0xae80, 0x0) dup2(r6, r5) [ 1482.252736] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. 20:32:46 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:32:46 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x540b, 0x2) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r1, r2, 0x0, 0x800009) setsockopt$inet6_tcp_int(r2, 0x6, 0x11, &(0x7f0000000040)=0x2d8, 0x4) 20:32:46 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000080)={0x0, @adiantum}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[], 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x0, 0x0, @private1}}}, &(0x7f0000000000)=0x84) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000000c0)={0x0, 0x5}, &(0x7f0000000100)=0x8) 20:32:46 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000040)=@gcm_256={{}, "4e0fc8a1036b74cc", "0415bee450146b8a86273bbe5aeb08e3363647a82834d901a87b96ef4c37caf0", "ab2b5852", "fedda5ad0aed48fd"}, 0x38) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffe36, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_DIRTYFB(0xffffffffffffffff, 0xc01864b1, &(0x7f0000000080)={0x3, 0x1, 0x20, 0x3, &(0x7f0000000000)=[{0x200, 0x20, 0x1000, 0x7}, {0x2, 0x20, 0x0, 0xbe24}, {0x4, 0xfffa, 0x1000}]}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(0xffffffffffffffff, r3, 0x0, 0x800009) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) recvfrom(r4, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(r4, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000280)={0x1c, r5, 0x711, 0x0, 0x0, {0x5}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r7}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r3, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x20, r5, 0x800, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @dev={[], 0x1f}}]}, 0x20}, 0x1, 0x0, 0x0, 0x4040044}, 0x8000) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:32:46 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:32:46 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) perf_event_open(&(0x7f0000348f88)={0x4, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x100000001, 0x80000003}, 0x0, 0x0, 0x101, 0x0, 0x0, 0x40000000}, r0, 0x2, 0xffffffffffffffff, 0x4) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000b82b1954dd534e28f35d9777bc72c2329e487caa31877ecca8f54c739a597e726d355b0394cafae1bd06bafffffff7f00000000792dd53c91e40e1568ad7db65c3cecde6c9d3be879924138994e5db77c7a8ea2cedad1a65d987746bddbd9a8396e3d409bd1c37ac6beeda2dd204ddfcb72c9a40a51a3a4358e8331991be237060000008c84a2a462fb00642997de25", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={r2, @in6={{0xa, 0x0, 0x0, @private1}}}, &(0x7f0000000000)=0x84) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000040)={r2, 0x4, 0x40, 0x1f, 0x1ff, 0x7}, &(0x7f0000000080)=0x14) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r1, r3, 0x0, 0x800009) 20:32:46 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x540b, 0x2) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x20800, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r4, r5, 0x0, 0x800009) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r8 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000580)=@newqdisc={0x2c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_mq={0x7, 0x1, 'mq\x00'}]}, 0x2c}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=@ipmr_delroute={0x4c, 0x19, 0x200, 0x70bd27, 0x25dfdbfb, {0x80, 0x20, 0x14, 0x6, 0xfe, 0x4, 0xff, 0x0, 0x2000}, [@RTA_FLOW={0x8, 0xb, 0x8}, @RTA_GATEWAY={0x8, 0x5, @multicast1}, @RTA_PRIORITY={0x8, 0x6, 0x7}, @RTA_OIF={0x8}, @RTA_OIF={0x8, 0x4, r7}, @RTA_PRIORITY={0x8, 0x6, 0x7}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20040000}, 0x4024890) sendfile(r2, r3, 0x0, 0x800009) renameat2(r1, &(0x7f0000000080)='./file0\x00', r3, &(0x7f00000000c0)='./file0\x00', 0x0) 20:32:46 executing program 2: ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xedc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$media(0x0, 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0xc0487c04, &(0x7f0000000000)=""/226) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x80000) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='?', 0x1, 0x40080, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB="170000d4", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x7a, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) setsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000180)=@int=0x8, 0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000100)={0xb921, 0x1, 0x4, 0xff, r5}, &(0x7f0000000140)=0x19) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) futex(&(0x7f00000004c0), 0x8c, 0x1, 0x0, 0x0, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) 20:32:46 executing program 5: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) r4 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x8180, 0x900) ioctl$TCFLSH(r4, 0x540b, 0x2) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r5, r6, 0x0, 0x800009) read$char_usb(r6, 0x0, 0x0) [ 1483.510565] sctp: [Deprecated]: syz-executor.2 (pid 26384) Use of int in max_burst socket option deprecated. [ 1483.510565] Use struct sctp_assoc_value instead [ 1483.542324] sctp: [Deprecated]: syz-executor.2 (pid 26393) Use of int in max_burst socket option deprecated. [ 1483.542324] Use struct sctp_assoc_value instead 20:32:48 executing program 0: syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x800009) ioctl$SNDRV_SEQ_IOCTL_PVERSION(0xffffffffffffffff, 0x80045300, &(0x7f0000000240)) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b03040000000000009263c15cedb0e23dcf8ba085e276ed3ae7a290ab0e744677134577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc71495953141dc2c20b14f0c07a11d6d9911e125458c5ad578726ae800511118918832c1af86b29ca66957dfdba7d26f72438fdfd6b31a1c0eb21e60adec6f9fc71e14ced8e8d400bc66e09f2ea708c59ddd7c30900000000000000fc3ceff2f98c11847cfe1b9e4f49665c5af6b9231eca27fce7f7091126b13c23a2f5702a87b1d4abd3aba06d674acb3288db5b06e38025914d85cfbb03ffae68c8aed7bf3c477effc5625fdf5f9f4a0367d8cddb3c000000"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0xffff, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x0, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:32:48 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x3, 0x2, 0x0, 0x0, 0x0, {0x5, 0x0, 0x6}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040001}, 0x40000) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r3, 0x80845663, &(0x7f0000000040)) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r4, r5, 0x0, 0x800009) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r5, 0xc040564a, &(0x7f0000000280)={0x3, 0x0, 0x2004, 0xae86, 0x1, 0xc3f5, 0x4}) socket$nl_netfilter(0x10, 0x3, 0xc) init_module(&(0x7f0000000100)='proc,em0\x00', 0x9, &(0x7f0000000140)='children\x00') syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') 20:32:48 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) getsockopt$inet_mreq(r1, 0x0, 0x24, &(0x7f0000000040)={@empty, @dev}, &(0x7f0000000080)=0x8) ioctl$TCFLSH(r0, 0x540b, 0x2) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$SO_TIMESTAMP(r2, 0x1, 0x40, &(0x7f00000001c0)=0x6e49497f, 0x4) read(r2, &(0x7f00000000c0)=""/66, 0x42) 20:32:48 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x74, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0xffffffff, @empty, 0x1}, @in={0x2, 0x4e20, @rand_addr=0x64010101}, @in6={0xa, 0x4e21, 0xfffffffd, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x5}, @in={0x2, 0x4e24, @multicast1}, @in6={0xa, 0x4e23, 0x7, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x2}]}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000140)={r2, 0x7fff}, 0x8) syz_mount_image$vfat(&(0x7f0000000180)='vfat\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000024c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-14'}}, {@iocharset={'iocharset', 0x3d, 'maccenteuro'}}]}) 20:32:48 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872d2b01000000", @ANYRES32=0x0, @ANYBLOB="ff7f000000000000140012800a00010076786c616e0000000400028008000a0036459cdb26"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) r0 = socket(0x10, 0x80002, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, r1, 0x1}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000100)={0xc0, r1, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0xac, 0x2, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}]}]}]}, 0xc0}}, 0x200000d0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 1485.541827] FAT-fs (loop2): bogus number of reserved sectors [ 1485.581803] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=26470 comm=syz-executor.3 [ 1485.602909] FAT-fs (loop2): Can't find a valid FAT filesystem 20:32:48 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x80000000, 0x0, 0x1, 0x0, 0x7}, 0x0, 0x10000000000000, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) geteuid() r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) r2 = socket$bt_bnep(0x1f, 0x3, 0x4) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f00000002c0)) fcntl$setownex(r2, 0xf, &(0x7f0000000040)={0x1, r3}) 20:32:48 executing program 3: perf_event_open(0x0, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872d2b01000000", @ANYRES32=0x0, @ANYBLOB="ff7f000000000000140012800a00010076786c616e0000000400028008000a0036459cdb26"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r1, r2, 0x0, 0x800009) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x1, 0x3}, 0x4) [ 1485.663178] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=26470 comm=syz-executor.3 20:32:49 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:32:49 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 20:32:49 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872d2b01000000", @ANYRES32=0x0, @ANYBLOB="ff7f000000000000140012800a00010076786c616e0000000400028008000a0036459cdb26"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x0) r1 = msgget(0x3, 0x408) msgctl$MSG_INFO(r1, 0xc, &(0x7f0000000280)=""/4096) 20:32:49 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c268f1c872d2b0100"/20, @ANYRES32=0x0, @ANYBLOB="ff7f000000000000140012800a00010076786c616e0000000400028008000a0036459cdb26"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 1486.236307] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. [ 1486.336635] overlayfs: filesystem on './file0' not supported as upperdir 20:32:49 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) write$P9_RCLUNK(r1, &(0x7f0000000040)={0x7, 0x79, 0x1}, 0x7) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000080)={{{@in=@local, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000180)=0xe8) ioctl$TUNSETOWNER(r3, 0x400454cc, r4) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_REVISION_TARGET(r5, 0x0, 0x43, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) ioctl$sock_SIOCINQ(r5, 0x541b, &(0x7f00000001c0)) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCFLSH(r6, 0x540b, 0x2) 20:32:51 executing program 0: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c652520f014d336b04b030400000000000092290a7e4555a763c154eda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0xffff, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x0, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:32:51 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000080), &(0x7f0000000100)=0x4) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r1, r2, 0x0, 0x800009) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r3, r4, 0x0, 0x800009) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="0180142f", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={r5, @in6={{0xa, 0x0, 0x0, @private1}}}, &(0x7f0000000000)=0x84) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r4, 0x84, 0x71, &(0x7f0000000140)={r5, 0x5}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f00000001c0)={r6, 0x2, 0x2, [0x0, 0x9]}, 0xc) ioctl$sock_ifreq(0xffffffffffffffff, 0x8971, &(0x7f00000003c0)={'dummy0\x00', @ifru_data=&(0x7f0000000380)="e4e1deb546f1cea016f99584c04b7e1af24570a6db707946463da6263c381033"}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[@ANYBLOB="3c28fc08b1360e1fb87231fdab0000103900028071fe3d5a872d2b01000000", @ANYRES32=0x0, @ANYBLOB="ff7f02000000003500000080028008000a0036a7925935"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) init_module(&(0x7f0000000000)='&wlan1GPL#\x00', 0xb, &(0x7f0000000040)='+^uservboxnet0self)vmnet1^#em0,&)/\x00') r7 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r7, &(0x7f00000000c0), 0x492492492492627, 0x0) ioctl$PPPIOCSMRU1(r2, 0x40047452, &(0x7f0000000280)=0x8) 20:32:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x7fff) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001400)=ANY=[@ANYBLOB='mpol=prefer']) 20:32:51 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x40800, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) getpeername(r1, &(0x7f0000000040)=@in={0x2, 0x0, @multicast2}, &(0x7f00000000c0)=0x80) ioctl$TCFLSH(r0, 0x540b, 0x2) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') accept4$bt_l2cap(r3, 0x0, &(0x7f0000000140), 0x800) sendfile(r2, r3, 0x0, 0x800009) read$eventfd(r3, &(0x7f0000000100), 0x8) 20:32:51 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x100, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000140)={0x60, 0x13, 0x0, 0x3, 0x8c, 0x3, &(0x7f0000000080)="bde381e8f8de077c54986ad99efef7dc617d1362b9c4942986539c644fec49b6c34248bd1ba2790169617d035674bbe45cc3adc4db40abbb8ea6076e1f79088ff4ccb406039a94dade05bb82a1b17f98610606af9d5fdc9a11cc6958c5d117090ab0f158a9df0a177b63f090ada82ab76cdd5da587e1085a61d422daf139576c288f284755de2a838604ef24"}) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video36\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$SO_TIMESTAMP(r2, 0x1, 0x40, &(0x7f00000001c0)=0x6e49497f, 0x4) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f0000000240)={{r2}, 0x3, 0x1, 0xd73}) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsu\x00', 0x14000, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r4, 0xc004500a, &(0x7f00000001c0)=0xfffffff7) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r5, r6, 0x0, 0x800009) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_REVISION_TARGET(r7, 0x0, 0x43, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) ftruncate(r7, 0x89) [ 1488.569119] QAT: Invalid ioctl [ 1488.665424] QAT: Invalid ioctl 20:32:51 executing program 2: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46802) io_setup(0x1fe, &(0x7f00000001c0)=0x0) io_submit(r2, 0x82, &(0x7f0000000540)=[&(0x7f00000000c0)={0xc, 0xb00, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7, 0xb000}]) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r3, r4, 0x0, 0x800009) ioctl$EVIOCGBITSW(r4, 0x80404525, &(0x7f0000000200)=""/221) 20:32:51 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872d2b01000000", @ANYRES32=0x0, @ANYBLOB="ff7f000000000000140012800a00010076786c616e0000000400028008000a0036459cdb26"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) r0 = socket(0x5, 0x80002, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r3, r4, 0x0, 0x800009) setsockopt$SO_TIMESTAMP(r3, 0x1, 0x40, &(0x7f00000001c0)=0x6e49497f, 0x4) r5 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$BLKSECTGET(r5, 0x1267, &(0x7f0000000040)) sendfile(r1, r2, 0x0, 0x800009) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r2, 0x4010ae68, &(0x7f0000000000)={0x2000, 0x100000}) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x0) 20:32:52 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$setperm(0x5, r0, 0x202002) keyctl$chown(0x4, r0, 0xee00, 0x0) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000040)='rxrpc_s\x00', 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r1, r2, 0x0, 0x800009) 20:32:52 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x0, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:32:52 executing program 0: r0 = syz_open_procfs(0x0, 0x0) r1 = gettid() r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r1) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000240)) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765c56a8f87e56f01c8893cc7149595314000000"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0xffff, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r3, r4, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r4, 0x0, 0x2d, &(0x7f00000000c0)={0x0, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r5, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$VIDIOC_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000400)={0x0, @reserved}) 20:32:52 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x540b, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mount$9p_xen(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x80000, &(0x7f0000000180)={'trans=xen,', {[{@cachetag={'cachetag', 0x3d, 'wrr\x00'}}, {@loose='loose'}, {@loose='loose'}, {@version_9p2000='version=9p2000'}], [{@smackfsdef={'smackfsdef', 0x3d, '\\trusted^\\'}}, {@smackfsroot={'smackfsroot', 0x3d, '.'}}]}}) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x0, @rand_addr=0x64010100, 0x4e20, 0x0, 'wrr\x00', 0xd, 0x1, 0x1d}, 0x2c) 20:32:52 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872d2b01000000", @ANYRES32=0x0, @ANYBLOB="ff7f000000000000140012800a00010076786c616e0000000400028008000a0036459cdb26"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) r0 = socket(0x10, 0x80002, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r1, r2, 0x0, 0x800009) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x1000, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) recvfrom(r4, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(r4, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000280)={0x1c, r5, 0x711, 0x0, 0x0, {0x5}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r7}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r5, 0x8, 0x70bd2d, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x4}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0xcc04}, 0x20000004) sendmsg$TIPC_NL_NAME_TABLE_GET(r2, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000040)={&(0x7f0000000100)={0x84, 0x0, 0x400, 0x70bd2b, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x70, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x800}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}, @TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x777}]}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0xd9bc}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x6}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x6}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x80000000}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}]}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x8010}, 0x20000000) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x0) 20:32:52 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={r2, @in6={{0xa, 0x0, 0x0, @private1}}}, &(0x7f0000000000)=0x84) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={r2, 0x583b}, &(0x7f00000001c0)=0x8) exit_group(0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f00000008c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x200, 0x200, 0x200, 0x20000, 0x308, 0x308, 0x308, 0x308, 0x308, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x1c0, 0x200, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5", 0x5}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x4, 0x3e, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@dev}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xb5) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000100)={&(0x7f0000000000)=[0x1f, 0xff], 0x2, 0x5db, 0xff, 0x3, 0x2, 0x170, 0x10000, {0x3, 0x40, 0x1, 0x200, 0x1f, 0xb0, 0x9, 0x5, 0x7f, 0x9, 0x2, 0x0, 0x8001, 0x9, "51ea3f69c53dfdd4c2090f1baf2aaa506c298e32d079b0b0331fbdc8ae4c4ee4"}}) 20:32:52 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x0, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:32:52 executing program 0: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0xffff, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='timerslack_ns\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x0, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:32:52 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x100, 0x6000) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000080)=0x1ff, &(0x7f00000000c0)=0x2) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r1, r2, 0x0, 0x800009) [ 1489.244310] IPVS: set_ctl: invalid protocol: 0 100.1.1.0:20000 20:32:52 executing program 3: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYRES64=r0, @ANYRES32=0x0, @ANYBLOB="ff7f000000000000140012800a00010076786c616e0000e6030002804e259e1bdf2a664c43"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f00000000c0), 0x492492492492627, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x200000, 0x0) ioctl$KVM_GET_PIT(r2, 0xc048ae65, &(0x7f0000000040)) 20:32:52 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x0, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:32:52 executing program 0: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0xffff, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x0, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x800009) ioctl$PPPIOCSACTIVE(0xffffffffffffffff, 0x40107446, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x8495, 0xff, 0x81, 0x1}]}) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:32:52 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x2880c0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r3, r4, 0x0, 0x800009) splice(r2, &(0x7f0000000080)=0x800, r4, &(0x7f00000000c0)=0x4, 0x1, 0xa) 20:32:53 executing program 2: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xc4, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) ioctl$TIOCGWINSZ(r3, 0x5413, &(0x7f0000000280)) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB="247727206e6f3d2e4a3a37f6cacead8500eebb39b2a5a4d1cdfb6dd943f36420627a4f39a5f1d0f6f34ce338bd39031a0ea26be341ca9fcf6879ca78f0853a3b091195821694e3ca8e2daff486c45d61617b66c84723c44dd0f1a4ffbbb884e78527f81bf1cdf0e08f1d65abf2c42c7dbbe07c59adfbaaa5f4", @ANYRESHEX=r1, @ANYBLOB=',\x00']) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r4, r5, 0x0, 0x800009) ioctl$USBDEVFS_SETINTERFACE(r5, 0x80085504, &(0x7f0000000240)={0x8, 0x1}) setsockopt$inet_udp_int(r1, 0x11, 0x67, &(0x7f00000000c0)=0xfffffffc, 0x4) 20:32:53 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) unshare(0x6000400) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$bt_hci_HCI_DATA_DIR(r2, 0x0, 0x16, 0x0, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r5, 0x0, 0x800009) 20:32:53 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x540b, 0x2) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r1, r2, 0x0, 0x800009) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001180)={0x14, r4, 0x917, 0x0, 0x0, {0x5}}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x68, r4, 0x2, 0x70bd28, 0x25dfdbfd, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x20}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x4}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x62}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x81}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e21}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e20}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e20}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x6}]}, 0x68}, 0x1, 0x0, 0x0, 0xc000}, 0x8000) [ 1490.024389] 9pnet: Insufficient options for proto=fd 20:32:53 executing program 3: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872d2b01000000", @ANYRES16=r0, @ANYBLOB="ff7f000000000000140012800a00010076786c616e0000000400028008000a0036459cdb26"], 0x3c}, 0x1, 0x8000a0ffffffff, 0x0, 0x40880}, 0x0) r1 = socket(0x10, 0x80002, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r6, r7, 0x0, 0x800009) ioctl$FUSE_DEV_IOC_CLONE(r7, 0x8004e500, &(0x7f0000000140)=r3) r8 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000580)=@newqdisc={0x2c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_mq={0x7, 0x1, 'mq\x00'}]}, 0x2c}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="5900000011070000000000000000150000100000", @ANYRES32=r5, @ANYBLOB="080000001010000008002000ff0000000a000100aaaaaaaaaaaa000004001400080078a97f0c1e2c"], 0x40}, 0x1, 0x0, 0x0, 0x20008004}, 0x4010) sendmmsg$alg(r1, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 1490.127426] 9pnet: Insufficient options for proto=fd 20:32:53 executing program 5: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_GET_SCAN(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)={0x28, r2, 0xab9535e9a6578fc1, 0x0, 0x0, {}, [@NL80211_ATTR_WDEV={0xc}, @NL80211_ATTR_IFINDEX={0x8}]}, 0x28}}, 0x0) sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, r2, 0x300, 0x70bd26, 0x25dfdbfd, {}, [@NL80211_ATTR_REG_ALPHA2={0x6, 0x21, 'b\x00'}, @NL80211_ATTR_REG_ALPHA2={0x6, 0x21, 'b\x00'}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x2}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x3}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x2}]}, 0x3c}, 0x1, 0x0, 0x0, 0x42811}, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCFLSH(r3, 0x540b, 0x2) 20:32:53 executing program 2: r0 = gettid() r1 = perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, r1, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000280)={0x1, 0x80ffff, [0x0]}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r4, r5, 0x0, 0x800009) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r5, 0x8982, &(0x7f0000000180)={0x0, 'veth1_vlan\x00'}) 20:32:53 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) perf_event_open(0x0, r0, 0x200000002000b, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872d2b01000000", @ANYRES32=0x0, @ANYBLOB="ff7f000000000000140012800a00010076786c616e0000000400028008000a0036459cdb26"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f00000000c0), 0x492492492492627, 0x0) 20:32:53 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x540b, 0x1) 20:32:53 executing program 0: r0 = syz_open_procfs(0x0, 0x0) r1 = gettid() r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) setresuid(0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x0, &(0x7f0000000540)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x8}}], [{@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '\\'}}, {@uid_lt={'uid<'}}, {@uid_eq={'uid'}}, {@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x1}}, {@audit='audit'}, {@euid_gt={'euid>'}}, {@euid_gt={'euid>'}}]}) prctl$PR_SET_PTRACER(0x59616d61, r1) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0xffff, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r3, r4, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r4, 0x0, 0x2d, &(0x7f00000000c0)={0x0, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r0, 0xffffffffffffffff, 0x0, 0x10000800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x5, 0x40, 0x0, 0x31e2f8c0, 0x60402, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x2, 0x10000}, 0x0, 0xfffffffffffffffe, 0x10000, 0x3, 0x7fff, 0x8, 0x2}, 0x0, 0x8000000010, 0xffffffffffffffff, 0xb) ptrace$setopts(0x4206, r1, 0x0, 0x0) [ 1490.778618] SELinux: security_context_str_to_sid(unconfined_u) failed for (dev bpf, type bpf) errno=-22 [ 1490.869905] SELinux: security_context_str_to_sid(unconfined_u) failed for (dev bpf, type bpf) errno=-22 20:32:55 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x0, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:32:55 executing program 1: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x800009) ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, &(0x7f0000000b00)=0x1) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000780)=[&(0x7f00000003c0)='security.selinux\x00', &(0x7f00000005c0)='children\x00', &(0x7f0000000600)='children\x00', &(0x7f0000000640)='\x8fbdevnodevvmnet0lo}mime_type,\x00', &(0x7f0000000680)='wlan1\x00', &(0x7f00000006c0)='/dev/null\x00', &(0x7f0000000700)='security.selinux\x00', &(0x7f0000000740)='/dev/null\x00'], &(0x7f00000008c0)=[&(0x7f00000007c0)='security.selinux\x00', &(0x7f0000000800)='children\x00', &(0x7f0000000840)='%\x00', &(0x7f0000000880)='security.selinux\x00']) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000280)={&(0x7f0000000040)="f964c9d2fe5b83a704ca3f927bbf2826734cb9dfb00c68ababb496808dc642998bf55ede8f79d39fe5cb6da9bb1f969f50b6fe4db336f22406ddbc1e9dc278c1813fd67ec984199af33659f8b98c0d1625d0974b88ade355e8fe538886", &(0x7f00000000c0)=""/136, &(0x7f0000000180)="6860df57eecfe839dab492638615d04287f1c8f0080c392a8aab747bab7570a2137b795b8779e63f562ae72f42f7d18fb271e8e18c03e36168ac390b758fa0682b96f3a58cb3eeb78613cf717ca2b08c85005f0ce1bf444eef55ef6a53c48a77c8ade5992fe8ba63c5b4865860013f7aa9d88d24fcbb002ea4c32aca5ce5161120b70cd25b67cb73fc7314dfa3e40e18810ce4589fea04226b7b90939fccf0", &(0x7f0000000240)="9c7273a5fbaa94a601282f05dc933abcfe23", 0x5c, 0x1, 0x4}, 0x38) sendfile(r0, r1, 0x0, 0x800009) chroot(&(0x7f0000000480)='./file0\x00') r2 = openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x4000, 0x0) r3 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r3, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r3, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r4, r5, 0x0, 0x800009) ioctl$BLKREPORTZONE(r5, 0xc0101282, &(0x7f0000000940)={0x9, 0x6, 0x0, [{0xff, 0x0, 0x2, 0x9a, 0x8, 0xc0, 0x8}, {0x3, 0x3, 0x3, 0x10, 0x5, 0x0, 0x1}, {0xe, 0x800, 0xd0, 0x1, 0x8, 0x1, 0x3}, {0x100000000, 0xff, 0xbf2, 0x1f, 0x6c}, {0x3ff, 0x1, 0x80, 0xff, 0x1, 0x0, 0x81}, {0x101, 0x2, 0x9, 0x5, 0x2, 0xc6, 0x56}]}) r6 = dup(r3) umount2(&(0x7f0000000900)='./file0\x00', 0x7) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1, 0x11, r6, 0xff) sendmsg$NFNL_MSG_CTHELPER_DEL(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000400)={&(0x7f00000004c0)=ANY=[@ANYBLOB="bc6f450002090126de71ef481af9de020006000340000100000c000280050001000100000006000340000200000c00028005000100880000001400018008000100ac141f6508000200006f34eca4000280050001009d0000800600034000000000060003400001100006000340000000004b42e58e54d0890d9fc4e8f02c00018014000300fc0200b149000000000000000000000014000400fc02000000000000000000000000000108000340501645c0080003400000000308000340ffffffff00000000000000"], 0xbc}, 0x1, 0x0, 0x0, 0x881}, 0x8000) 20:32:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xa, 0x80000000}], 0xc102, 0x0) 20:32:55 executing program 0: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0xffff, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$UFFDIO_ZEROPAGE(0xffffffffffffffff, 0xc020aa04, &(0x7f0000000240)={{&(0x7f0000ffd000/0x1000)=nil, 0x1000}}) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x44, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x8d}, @L2TP_ATTR_PW_TYPE={0x6}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'sit0\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(0xffffffffffffffff, r2, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r2, 0x0, 0x2d, &(0x7f00000000c0)={0x0, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:32:55 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) setpriority(0x0, r0, 0x7fff) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x109a02, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000100)={0x152, 0x17, &(0x7f0000000680)}) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCFLSH(r2, 0x540b, 0x2) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000640)=0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000640)=0x0) timer_settime(r6, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_settime(r6, 0x0, &(0x7f0000000140)={{r4, r5+10000000}}, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_REVISION_TARGET(r7, 0x0, 0x43, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) ioctl$sock_inet_SIOCGIFDSTADDR(r7, 0x8917, &(0x7f0000000040)={'macvlan0\x00', {0x2, 0x4e23, @remote}}) timer_getoverrun(r3) 20:32:55 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872d2b01000000", @ANYRES32=0x0, @ANYBLOB="ff7f000000000000140012800a00010076786c616e0000000400028008000a0036459cdb26"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) r0 = socket(0x1, 0xa, 0xfffffffb) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x0) 20:32:55 executing program 0: r0 = syz_open_procfs(0x0, 0x0) r1 = gettid() r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r1) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RLINK(r0, &(0x7f0000000240)={0x7, 0x47, 0x2}, 0x7) close(r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0xffff, 0x8, 0x4, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r3, r4, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r4, 0x0, 0x2d, &(0x7f00000000c0)={0x0, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r5, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) 20:32:55 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0xda, 0xfb, 0x2, 0x0, 0x6834, 0x403, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x401, 0x40}, 0x4284, 0xfff, 0x2, 0x6, 0x7, 0x14, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) sendfile(r0, r1, 0x0, 0x800009) 20:32:55 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x0, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:32:55 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) ioctl$sock_rose_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x81, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x4, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) fadvise64(0xffffffffffffffff, 0x3f, 0x100000001, 0x4) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r1, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x8}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @rand_addr=0x64010101}]}, 0x24}, 0x1, 0x0, 0x0, 0x20008000}, 0x4) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0xa0ec3c11d1c0c367) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000240)) prctl$PR_GET_FP_MODE(0x2e) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x80000, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r3, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x40, 0x0, 0x400, 0x70bd29, 0x25dfdbff, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x24000015}, 0x4000000) preadv(r3, &(0x7f0000001640)=[{&(0x7f00000003c0)=""/16, 0x10}, {&(0x7f0000000400)=""/205, 0xcd}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/92, 0x5c}, {&(0x7f0000001580)=""/71, 0x47}, {&(0x7f0000001600)=""/37, 0x25}], 0x6, 0x71) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000016c0)=0x1, 0x4) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000001700)='/dev/vcsu\x00', 0x80000, 0x0) getpeername(r4, &(0x7f0000001740)=@x25, &(0x7f00000017c0)=0x80) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r2, 0xc1205531, &(0x7f0000001800)={0x7ff, 0xff, 0x0, 0x3f, [], [], [], 0x9, 0x101, 0x10001, 0x7, "1060609f498e7ace0049f648d6e8a1c0"}) ioctl$VIDIOC_ENUMAUDOUT(r4, 0xc0345642, &(0x7f0000001940)={0x2, "fa4b30ea3dc63d804c1796c8cf3bcbcb2ef71e83cf6350d6fb2c598d2d2de49b", 0x1, 0x1}) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000001980)='/dev/cachefiles\x00', 0x100, 0x0) ioctl$SIOCX25GDTEFACILITIES(r5, 0x89ea, &(0x7f00000019c0)) r6 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r6, 0x8983, &(0x7f0000001a00)={0x1, 'rose0\x00', {}, 0x3}) 20:32:56 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$SO_TIMESTAMP(r2, 0x1, 0x40, &(0x7f00000001c0)=0x6e49497f, 0x4) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000580)=@newqdisc={0x2c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_mq={0x7, 0x1, 'mq\x00'}]}, 0x2c}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000040)={'batadv0\x00', r5}) 20:32:56 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x0, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:32:56 executing program 2: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000040)='SMC_PNETID\x00') sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={0x28, r1, 0x8, 0x0, 0x25dfdbfc, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'syzkaller0\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x20004010}, 0x0) [ 1492.980627] QAT: Invalid ioctl 20:32:56 executing program 1: prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000040)) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0xfc, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x40000000001, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) 20:32:56 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_REMOVEDEF(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="70010000", @ANYRES16=r2, @ANYBLOB="04002cbd7000fddbdf25050000000d0001006368696c6472656e0000000014000600200100000000000000000000000000010800080000000000080002000300000006000b001100000006000b003b00000008000c000000000008000c000100000008000800ffffffff"], 0x70}, 0x1, 0x0, 0x0, 0x814}, 0x4004810) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r3, r4, 0x0, 0x800009) 20:32:56 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x0, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:32:58 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)={0x18, r3, 0x1, 0x0, 0x0, {0xa}, [@IPVS_CMD_ATTR_DAEMON={0x4}]}, 0x18}}, 0x0) sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0xcc, r3, 0x403, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x68, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_virt_wifi\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_virt_wifi\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0xff}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfffffa7b}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x73}]}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @private2}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x80}, 0x4045000) open(&(0x7f0000000080)='./file1\x00', 0x141, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20006503d, 0x400000007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x218, 0x0, 0x0}, 0x40) mount(0x0, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000180)='nfs\x00', 0x0, &(0x7f0000000000)) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r4, r5, 0x0, 0x800009) setsockopt$SO_TIMESTAMP(r4, 0x1, 0x40, &(0x7f00000001c0)=0x6e49497f, 0x4) sendmsg$IPSET_CMD_GET_BYINDEX(r4, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x44, 0xf, 0x6, 0x801, 0x0, 0x0, {0x2}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_INDEX={0x6, 0xb, 0x1}, @IPSET_ATTR_INDEX={0x6}, @IPSET_ATTR_INDEX={0x6, 0xb, 0x4}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x100}, 0x4000) 20:32:58 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x2, 0x0, 0x0, 0xa0084, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') ioctl$SNDRV_PCM_IOCTL_WRITEI_FRAMES(r1, 0x40184150, &(0x7f0000000140)={0x0, &(0x7f00000000c0)="268720754418b7337474cee5caff6520e794e919a09751714c993646eb8a8f5eb0995a1e11fad8df6a83a91469ea831a0cd1a5e879d8d38b13fc3f51db7601c90326ac5398c52770b7c8beb4ce3ba5871d63c24e9fe545c5c107c501538dc14ab6e4bed2f1f732bf469dd03840f9", 0x6e}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x4200, 0x0) write$FUSE_STATFS(r1, &(0x7f0000000040)={0x60, 0x800000000000004b, 0x4, {{0x0, 0x7fffffff, 0x7, 0x7, 0x9, 0x6, 0x7, 0xc4}}}, 0x60) sendfile(r0, r1, 0x0, 0x800009) 20:32:59 executing program 0: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0xffff, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x0, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x41, 0x0) ioctl$USBDEVFS_DISCARDURB(r5, 0x550b, &(0x7f0000000340)=0x1ff) 20:32:59 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x513101, 0x0) ioctl$TCFLSH(r0, 0x540b, 0x2) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r1, r2, 0x0, 0x800009) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x40, &(0x7f00000001c0)=0x6e49497f, 0x4) preadv(r1, &(0x7f0000001500)=[{&(0x7f0000000080)=""/80, 0x50}, {&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/98, 0x62}, {&(0x7f0000001180)=""/43, 0x2b}, {&(0x7f00000011c0)=""/121, 0x79}, {&(0x7f0000001240)=""/193, 0xc1}, {&(0x7f0000001340)=""/159, 0x9f}, {&(0x7f0000001400)=""/203, 0xcb}], 0x8, 0xbf45ac) 20:32:59 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872d2b01000000", @ANYRES32=0x0, @ANYBLOB="ff7f000000000000140012800a00010076786c616e0000000400028008000a0036459cdb26"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) r0 = socket(0x10, 0x80002, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x40, &(0x7f00000001c0)=0x6e49497f, 0x4) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$gtp(&(0x7f0000000080)='gtp\x00') sendmsg$GTP_CMD_GETPDP(r2, &(0x7f0000009140)={0x0, 0x0, &(0x7f0000000740)={&(0x7f00000003c0)={0x14, r3, 0x390c179b360adb45}, 0x14}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000580)=@newqdisc={0x2c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_mq={0x7, 0x1, 'mq\x00'}]}, 0x2c}}, 0x0) sendmsg$GTP_CMD_DELPDP(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x64, r3, 0x300, 0x70bd2d, 0x25dfdbfb, {}, [@GTPA_TID={0xc, 0x3, 0x4}, @GTPA_LINK={0x8, 0x1, r5}, @GTPA_O_TEI={0x8, 0x9, 0x3}, @GTPA_VERSION={0x8, 0x2, 0x1}, @GTPA_TID={0xc, 0x3, 0x4}, @GTPA_I_TEI={0x8}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_FLOW={0x6, 0x6, 0x28}, @GTPA_VERSION={0x8, 0x2, 0x1}]}, 0x64}, 0x1, 0x0, 0x0, 0x40}, 0x400d0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r7, r8, 0x0, 0x800009) setsockopt$SO_TIMESTAMP(r7, 0x1, 0x40, &(0x7f00000001c0)=0x6e49497f, 0x4) fcntl$setflags(r7, 0x2, 0x1) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x0) 20:32:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x0) sendmsg$DCCPDIAG_GETSOCK(r1, &(0x7f0000001900)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000018c0)={&(0x7f0000001a40)=ANY=[@ANYBLOB="68100000130001022bbd7000fbdbdf252007fa004e234e22e7070000008000000300000003000000ee000000070000003977000001000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x1068}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$AUDIT_DEL_RULE(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000180)={&(0x7f00000008c0)=ANY=[@ANYBLOB="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"/1094], 0x444}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmdt(0x0) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000880)) recvmmsg(0xffffffffffffffff, &(0x7f0000000f40)=[{{&(0x7f00000007c0)=@ipx, 0x80, 0x0}}, {{&(0x7f0000000300)=@in={0x2, 0x0, @empty}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000380)=""/193, 0xc1}, {&(0x7f0000000480)=""/162, 0xa2}, {&(0x7f0000000540)=""/195, 0xc3}, {&(0x7f0000000640)=""/89, 0x59}, {&(0x7f0000000fc0)=""/178, 0xb2}, {&(0x7f0000000d40)=""/157, 0x9d}, {&(0x7f0000000840)=""/14, 0xe}, {&(0x7f0000000e00)=""/83, 0x53}], 0x8, &(0x7f0000000f00)=""/14, 0xe}, 0x800}], 0x2, 0x13102, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit(0x80) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') preadv(r3, &(0x7f00000017c0), 0x1b4, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x80, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x16e4c, 0x1042}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x44, 0x2, 0x0, 0x1, [@IFLA_VTI_REMOTE={0x8, 0x5, @local}, @IFLA_VTI_REMOTE={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @IFLA_VTI_REMOTE={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @IFLA_VTI_REMOTE={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}, @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_REMOTE={0x8, 0x5, @multicast1}, @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x7}], @IFLA_VTI_REMOTE={0x8, 0x5, @local}]}}}, @IFLA_MASTER={0x8, 0x3}, @IFLA_MASTER={0x8}]}, 0x80}, 0x1, 0x0, 0x0, 0x4044141}, 0x44004) 20:32:59 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={r2, @in6={{0xa, 0x0, 0x0, @private1}}}, &(0x7f0000000000)=0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={r3, @in6={{0xa, 0x0, 0x0, @private1}}}, &(0x7f0000000000)=0x84) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000040)={r2, 0x6, 0x7fff, 0x1000, 0x2, 0x5, 0x3, 0x3, {r3, @in={{0x2, 0x4e21, @multicast1}}, 0x3, 0x4, 0x0, 0x0, 0x4}}, &(0x7f0000000100)=0xb0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000140)={r4, 0x20}, &(0x7f0000000180)=0x8) 20:32:59 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872d2b01000000", @ANYRES32=0x0, @ANYBLOB="ff7f000000000000140012800a00010076786c616e0000000400028008000a0036459cdb26"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) futimesat(r1, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={{0x77359400}, {r2, r3/1000+10000}}) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f00000000c0), 0x492492492492627, 0x0) 20:32:59 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) ioctl$PPPIOCATTACH(r1, 0x4004743d, &(0x7f0000000040)) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x43, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) r5 = accept(r4, &(0x7f0000000080)=@l2, &(0x7f0000000100)=0x80) setsockopt$inet_tcp_TLS_TX(r5, 0x6, 0x1, &(0x7f0000000140)=@gcm_256={{0x303}, "6c1c421f427c9baa", "226d9539cf73d874feb50c5389abb02dcc754f9e4725bb2fc765892926c4714a", "7716c169", "f92db462e1f46bbc"}, 0x38) sendfile(r2, r3, 0x0, 0x800009) 20:32:59 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x0, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:32:59 executing program 0: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0xffff, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x0, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:32:59 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872d2b01000000", @ANYRES32=0x0, @ANYBLOB="ff7f000000000000786c616e0000000400028008000a0036459cdb26000000000000000000"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x0) 20:32:59 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/unix\x00') sendfile(r1, r2, 0x0, 0x800009) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r3, r4, 0x0, 0x800009) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14a1dbe73e359777cdc7d208194f3448933c000000", @ANYRES16, @ANYRESOCT, @ANYRESHEX], 0x14}, 0x1, 0x0, 0x0, 0x20040000}, 0x0) ioctl$SNDRV_PCM_IOCTL_USER_PVERSION(0xffffffffffffffff, 0x40044104, &(0x7f0000000080)=0x3) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="5698db98b0d121698b6c38b126b17b7316e093424cf75bb2cdd341618e0b360d31b5bad7c38083f76c806d7663210f5280af66bfb3ac8df5121b976559c46201571a7a6e44df0ee4bc0a37bd9e3329ddbbfbe69cc15c85eda02d5474c7b7125599bad9c93a63fbd1ed903061f27016c2fefc09cdbbd167306cbaf1267d37d73b1b4d936abc9c30bb73f08808aa61511c481336894f008c2b354c7fd08e7bb176ad6af08df0c213ece1b07559eb262b7314d20d60", @ANYRES16=r6, @ANYBLOB="d29d2dbd7000fddbdf250100000006001a004e22000014001f000000000000000000000000000000000105001300800000000500120000000000050021000000000008000a0000000000"], 0x50}, 0x1, 0x0, 0x0, 0x20004001}, 0xc001) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r7, r8, 0x0, 0x800009) ioctl$FS_IOC_SETFLAGS(r8, 0x40086602, &(0x7f0000000280)=0xffff) ioctl$TCFLSH(r0, 0x540b, 0x2) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(0xffffffffffffffff, r9, 0x0, 0x800009) sendmsg$IPSET_CMD_GET_BYINDEX(r9, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x4c, 0xf, 0x6, 0x1, 0x0, 0x0, {0x2, 0x0, 0x4}, [@IPSET_ATTR_INDEX={0x6, 0xb, 0x3}, @IPSET_ATTR_INDEX={0x6, 0xb, 0xffffffffffffffff}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_INDEX={0xffffffffffffff8e, 0xb, 0x2}, @IPSET_ATTR_INDEX={0x6, 0xb, 0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}, 0x1, 0x0, 0x0, 0x1}, 0x5) 20:32:59 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x0, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:32:59 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$setperm(0x5, r0, 0x202002) keyctl$chown(0x4, r0, 0xee00, 0x0) keyctl$read(0xb, r0, &(0x7f0000000040)=""/135, 0x87) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r1, r2, 0x0, 0x800009) [ 1496.529247] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. 20:32:59 executing program 0: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a7dbc15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0xffff, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f0000000400)={0x4, 0xb, 0x4, 0x100, 0x10001, {}, {0x3, 0x2, 0x3, 0x0, 0xcc, 0x4, "2091a287"}, 0x2, 0x4, @fd}) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x0, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:32:59 executing program 3: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0xffff, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x0, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x41, 0x0) ioctl$USBDEVFS_DISCARDURB(r5, 0x550b, &(0x7f0000000340)=0x1ff) 20:33:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x0) sendmsg$DCCPDIAG_GETSOCK(r1, &(0x7f0000001900)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000018c0)={&(0x7f0000001a40)=ANY=[@ANYBLOB="68100000130001022bbd7000fbdbdf252007fa004e234e22e7070000008000000300000003000000ee000000070000003977000001000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x1068}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) sendmsg$AUDIT_DEL_RULE(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000180)={&(0x7f00000008c0)=ANY=[@ANYBLOB="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"/1094], 0x444}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmdt(0x0) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000880)) recvmmsg(0xffffffffffffffff, &(0x7f0000000f40)=[{{&(0x7f00000007c0)=@ipx, 0x80, 0x0}}, {{&(0x7f0000000300)=@in={0x2, 0x0, @empty}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000380)=""/193, 0xc1}, {&(0x7f0000000480)=""/162, 0xa2}, {&(0x7f0000000540)=""/195, 0xc3}, {&(0x7f0000000640)=""/89, 0x59}, {&(0x7f0000000fc0)=""/178, 0xb2}, {&(0x7f0000000d40)=""/157, 0x9d}, {&(0x7f0000000840)=""/14, 0xe}, {&(0x7f0000000e00)=""/83, 0x53}], 0x8, &(0x7f0000000f00)=""/14, 0xe}, 0x800}], 0x2, 0x13102, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit(0x80) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') preadv(r3, &(0x7f00000017c0), 0x1b4, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x80, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x16e4c, 0x1042}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x44, 0x2, 0x0, 0x1, [@IFLA_VTI_REMOTE={0x8, 0x5, @local}, @IFLA_VTI_REMOTE={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @IFLA_VTI_REMOTE={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @IFLA_VTI_REMOTE={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}, @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_REMOTE={0x8, 0x5, @multicast1}, @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x7}], @IFLA_VTI_REMOTE={0x8, 0x5, @local}]}}}, @IFLA_MASTER={0x8, 0x3}, @IFLA_MASTER={0x8}]}, 0x80}, 0x1, 0x0, 0x0, 0x4044141}, 0x44004) 20:33:00 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r2, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r2, 0x0) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000040)={0x10000, 0x9, 0x4, 0x20000, 0x4, {}, {0x1, 0x2, 0x0, 0x8b, 0xfa, 0x20, "9ef2d1f2"}, 0x1, 0x4, @offset=0x2, 0x80000001, 0x0, r2}) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r1, r3, 0x0, 0x800009) 20:33:00 executing program 3: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0xffff, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x0, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x41, 0x0) ioctl$USBDEVFS_DISCARDURB(r5, 0x550b, &(0x7f0000000340)=0x1ff) 20:33:00 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f0000000080)=0x8) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$SO_TIMESTAMP(r2, 0x1, 0x40, &(0x7f00000001c0)=0x6e49497f, 0x4) r4 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000340)={0x0, 0xfb, "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"}, &(0x7f0000000100)=0x103) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r5, 0x0) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r9 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r9, r7, r8) fchown(r2, r5, r8) r10 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x420000, 0x0) ioctl$TCFLSH(r10, 0x540b, 0x2) 20:33:00 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x540b, 0x2) 20:33:00 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)=ANY=[@ANYBLOB="090010bb16da6734db51e2c3dff4dcdb1400d2afc271a0b7eb7610695440f2a996f74a5cbdfbdd17cf0718f42e", @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={r2, @in6={{0xa, 0x0, 0x0, @private1}}}, &(0x7f0000000000)=0x84) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000000c0)=@assoc_id=r2, &(0x7f0000000100)=0x4) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') sendfile(r3, r4, 0x0, 0x800009) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r5, r6, 0x0, 0x800009) ioctl$SG_GET_TIMEOUT(r6, 0x2202, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r4, 0x0, 0x61, &(0x7f0000000040)={'filter\x00', 0x4}, 0x68) 20:33:00 executing program 5: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) ioctl$TCFLSH(r1, 0x540b, 0x2002) 20:33:00 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='children\x00') sendfile(r0, r1, 0x0, 0x800009) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000080)={{0x2, 0x4e21, @multicast2}, {0x1, @local}, 0x0, {0x2, 0x4e21, @multicast1}, 'gre0\x00'}) 20:33:02 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:02 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f00000002c0)) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f00000002c0)) r5 = syz_open_procfs(r4, &(0x7f0000000100)='attr/fscreate\x00') sendfile(r2, r5, 0x0, 0x800009) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) r7 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x200040, 0x0) mmap$snddsp(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x1000008, 0x12, r7, 0x4000) r8 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r8, 0x40405514, &(0x7f0000000180)={0x9, 0x5, 0xffffffff, 0x0, '\x00', 0xfffffffa}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={r6, @in6={{0xa, 0x0, 0x0, @private1}}}, &(0x7f0000000000)=0x84) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r5, 0x84, 0x71, &(0x7f0000000040)={r6, 0x8}, &(0x7f0000000080)=0x8) 20:33:02 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x800009) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000003c0)='batadv\x00') sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)=ANY=[@ANYBLOB="0200", @ANYRES16=r1, @ANYBLOB="00022bbd7000fcdbdf250f00000005002a0098000000080039000800000008003b000300000008003400f33c0000050030000000000005003800010000000800320001040000"], 0x4c}, 0x1, 0x0, 0x0, 0x40010}, 0x14) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) r4 = socket(0x11, 0x800000003, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r5, r6, 0x0, 0x800009) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x24, 0x0, 0x0, 0x70bd2c, 0xec, {}, [@BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}]}, 0x24}}, 0x81) sendmsg$NFNL_MSG_ACCT_NEW(r6, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0xac, 0x0, 0x7, 0x3, 0x0, 0x0, {0x5}, [@NFACCT_FLAGS={0x8}, @NFACCT_NAME={0x9, 0x1, 'syz0\x00'}, @NFACCT_FILTER={0x4c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x10001}, @NFACCT_FILTER_VALUE={0x8}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x5}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0xfffffffe}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x8}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x4}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0xfffffeff}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x9}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x200}]}, @NFACCT_FILTER={0x24, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x3ff}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x78}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x7fffffff}, @NFACCT_FILTER_VALUE={0x3f, 0x2, 0x1, 0x0, 0x9}]}, @NFACCT_FILTER={0x14, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0xdf6}]}]}, 0xac}, 0x1, 0x0, 0x0, 0x4000}, 0x80) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) setsockopt$netrom_NETROM_T1(r3, 0x103, 0x1, &(0x7f00000001c0)=0xe2, 0x4) socket(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x28110908}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@bridge_dellink={0x28, 0x11, 0x21, 0x70bd2b, 0x25dfdbff, {0x7, 0x0, 0x0, 0x0, 0x908, 0x8000}, [@IFLA_TXQLEN={0x8, 0xd, 0x7}]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x24000084) r7 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x6a4000, 0x0) ioctl$TCFLSH(r7, 0x540b, 0x2) 20:33:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f0000000080)=0x8) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$SO_TIMESTAMP(r2, 0x1, 0x40, &(0x7f00000001c0)=0x6e49497f, 0x4) r4 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000340)={0x0, 0xfb, "89bff38292565be48ea068fb49914f9e9799dbf1e4c252a0a5bb3eea832155457df0b9d00cd99a38bb3b38a31bbf62d395b7bbd96943dddcf28ddb005f0725b74308449b563165494276596600e8e96b73913c6450bcc8353ddf5451918faeb8857e6cc6cf882e628e6a8acfa4a097254dca9f749780426be66c4d4850e043627bbda41608682bd721f33a8f2e94ac73daab581eb36b3f379346238f89e9506b8040aa7149adb6143d3e21a1ba9fd13dc903bbd0cd0141224ed9d982d530d97e960ac8d055c88b2d7397919701b852568d3e499a1126514d7bfd16b68c9afdb5f5edc755ca153e03da01bb4bc16f0f2d14beca5b665bdc7744826c"}, &(0x7f0000000100)=0x103) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r5, 0x0) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r9 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r9, r7, r8) fchown(r2, r5, r8) r10 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x420000, 0x0) ioctl$TCFLSH(r10, 0x540b, 0x2) 20:33:02 executing program 0: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0xffff, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x0, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000340)='./file0\x00', 0xfffffffffffffffd, 0x5, &(0x7f0000000840)=[{&(0x7f0000000400)="519232fa1902fb9f4746a709362b891ab7e662783c544709f4be3332e88e4975d2ae2d7b4a8cbefa56327e0c2adf1321d667bb2d5fe1419ea6627735cfcc9b545cfdf5f486f565b06ae55bc09e6e7b00a9915b817173da8de50b9f048531047197113911f44fd6efd2f1d209273f843af62bdadb549b65787ccf9ee82271c5f641170fba88d6bf79ecb35bbc9d6a6527fff0d8cefd7f", 0x96, 0x3}, {&(0x7f00000004c0)="8aadbf45c56c1368cc757e1d2c65178e824b5932e7ac1768420e6ae9cfc18113ced92521f9ccdf56aabed51be5904e010b69f48e6a743701ea3c8ce493a4faa58107de694f1a22dd990012c543700b07885b2c71775a5387e4bea2e2a84767bbce549484d029f09abc5db2a50a7ff27b2fd02fac6cac024bf817f34907601a2a67ad4a61fd854f54d407f77c0fb662b37974231b393bd20b0f54ff73e68751a10296bbddc199432f5c5972cd3e3e5f6889034e2d803c9380d71ff96e276094c1481373649af0b0060d7c5c65349832a9902e13b4f67875293856c8c9b6e56abaf446e09515be", 0xe6, 0xfffffffffffffff7}, {&(0x7f00000005c0)="f323e12349222f712248d829f77fa675dcb5cfcc6e9bc74c176283c0c35a8329aee97145fc71facc4a8ab54a737ab6db7dfc96f38cc0575a26db24c7333a857b0577d58195cfa8f632c81f99da4744c9964f9431d7fae492201fcb85bfac9991bcf18b02f68cf2c2c6fe4a37ed9f37f90aa92314762c1ad42d9c199080cc5df73096288bcf91c5007e8c239cadfb9b37ad69ab042936b28eec0b05fd8eb246a5a9b0110cc583d8f3e15880f5fe53def3b3f1257eeddcf555591688c01a562db848e30fb3", 0xc4, 0xffff}, {&(0x7f00000006c0)="af61312a8c491f55e05f7b55957c776740153196bf4a63ca5ac7132d044e17711b996781c1f30601c1e172c302e733acfb48c2104acd161d4750431dcbd3924926fdc394c0bf3680461824f818ad8994ddda67134a30d07500f649be8b3d10", 0x5f, 0x1}, {&(0x7f0000000740)="e3dd0eaa0bc19960a41c644dbf03bc81d0e9b89a32afc1409d4403d86d9d763ccbc2adde627f088899868da3016700b4bc31c7d2b38fa0327a6def15fe77469e4a48bbf9052b9273c8541a044f878df47c465dd8313d70aa8379508dde0aff704dadc85ea457284af9b8928be939b8d3a09293aae98fd74791e22156404a2bb8ef76149dfad17b5892bb42c3eafa3c4d51ef653748dd3ed52aa2c39d95741738a4375c4a4228d4d9d906692e53ad5a5d79ccc18d62c64dad70c16ea0305bfe6d95c4c7df1667010c459380d2fb1afb3516213bfdb47dd356e7a693829a6312e088f3dfe194727924455f88645c2b", 0xee}], 0x1000000, &(0x7f00000008c0)={[{@shortname_lower='shortname=lower'}, {@rodir='rodir'}], [{@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}, {@permit_directio='permit_directio'}]}) 20:33:02 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 1499.804447] FAT-fs (loop0): Unrecognized mount option "appraise_type=imasig" or missing value [ 1499.868774] FAT-fs (loop0): Unrecognized mount option "appraise_type=imasig" or missing value 20:33:03 executing program 3: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x0, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:03 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f0000000080)=0x8) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$SO_TIMESTAMP(r2, 0x1, 0x40, &(0x7f00000001c0)=0x6e49497f, 0x4) r4 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000340)={0x0, 0xfb, "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"}, &(0x7f0000000100)=0x103) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r5, 0x0) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r9 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r9, r7, r8) fchown(r2, r5, r8) r10 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x420000, 0x0) ioctl$TCFLSH(r10, 0x540b, 0x2) 20:33:03 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x20000, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r1, r2, 0x0, 0x800009) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000080)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0xfffffc00}) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r3, r4, 0x0, 0x800009) setsockopt$SO_TIMESTAMP(r3, 0x1, 0x40, &(0x7f00000001c0)=0x6e49497f, 0x4) r5 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="00022dbd70000000000025000000080001007063690011000200303030303a30303a31302e300000000008008a00", @ANYRES32, @ANYBLOB="0af354b8dc235168166cc73958a35db7b7d91e8a65a4efeb886e4b016a6eb47c2ba28cf0e1f7bb31382b264028b6078c3003d6f5233308b7ef1de0bf8e4664cfccd6626229c1520000d836d706376cc1bedbc50c93d04ad3"], 0x38}, 0x1, 0x0, 0x0, 0x2000000c}, 0x0) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f00000002c0)) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)={0xf4, r5, 0x321, 0x70bd29, 0x25dfdbfd, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x1}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x3}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x3}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r6}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x4}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x8a, r4}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4}, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r3, 0x10e, 0x8, &(0x7f00000000c0)=0x8c46, 0x4) ioctl$TCFLSH(r0, 0x540b, 0x2) 20:33:03 executing program 1: ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, &(0x7f00000000c0)={0x950, 0x1ff, 0x900000}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) 20:33:03 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000002c0)) r2 = syz_open_procfs(r1, &(0x7f0000000000)='net/fib_triestat\x00') write$P9_RUNLINKAT(r2, &(0x7f0000000040)={0x7, 0x4d, 0x1}, 0x7) sendfile(r0, r2, 0x0, 0x800009) 20:33:03 executing program 3: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x0, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:03 executing program 2: unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x240, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={r1, @in6={{0xa, 0x0, 0x0, @private1}}}, &(0x7f0000000000)=0x84) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)={r1, 0x1}, &(0x7f00000002c0)=0x8) semget$private(0x0, 0x403, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180)={r2, @empty, @private=0xa010101}, 0xc) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000680)=ANY=[@ANYBLOB='\x00\x00\x00\x00']) ioctl$sock_ax25_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/ipc\x00') setns(r3, 0x0) 20:33:04 executing program 2: unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x240, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={r1, @in6={{0xa, 0x0, 0x0, @private1}}}, &(0x7f0000000000)=0x84) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)={r1, 0x1}, &(0x7f00000002c0)=0x8) semget$private(0x0, 0x403, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180)={r2, @empty, @private=0xa010101}, 0xc) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000680)=ANY=[@ANYBLOB='\x00\x00\x00\x00']) ioctl$sock_ax25_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/ipc\x00') setns(r3, 0x0) 20:33:04 executing program 2: unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x240, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={r1, @in6={{0xa, 0x0, 0x0, @private1}}}, &(0x7f0000000000)=0x84) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)={r1, 0x1}, &(0x7f00000002c0)=0x8) semget$private(0x0, 0x403, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180)={r2, @empty, @private=0xa010101}, 0xc) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000680)=ANY=[@ANYBLOB='\x00\x00\x00\x00']) ioctl$sock_ax25_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/ipc\x00') setns(r3, 0x0) 20:33:04 executing program 2: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x3941, 0x18240) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x80) memfd_create(0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000080)={0x0, 'ip6gretap0\x00', 0x4}, 0x18) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x14, &(0x7f0000000000)=0x100000001, 0x4) finit_module(r1, &(0x7f0000000100)='ppp1vmnet0e:(em0\x00', 0x1) bind(0xffffffffffffffff, 0x0, 0x0) bind$inet(r1, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@timestamp, @mss={0x2, 0x401}, @timestamp, @sack_perm], 0x4) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000580)='\x00', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x6, 0x80ffffffff}, 0x14) 20:33:05 executing program 2: socket$packet(0x11, 0x0, 0x300) r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x400, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r1, 0x800442d2, &(0x7f0000000280)={0x0, &(0x7f0000000240)}) openat$misdntimer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/mISDNtimer\x00', 0x4420c0, 0x0) fcntl$setstatus(r1, 0x4, 0x98428d57a99b5f44) io_setup(0xd, &(0x7f0000000100)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, 0xffffffffffffffff, 0x0}]) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000}, 0x810, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002105f7c, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) truncate(&(0x7f0000000180)='./bus\x00', 0x2000000000008) recvmsg(r1, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x2001) r3 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r3, 0x84, 0x21, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000300)={0x5, 0xb, 0x4, 0x40000, 0x20, {}, {0x2, 0x8, 0x4, 0x5, 0x7, 0x1f, "41de58ee"}, 0x7ed3, 0x2, @fd=r1, 0x3ff, 0x0, 0xffffffffffffffff}) mmap$xdp(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x11, r4, 0x80000000) 20:33:05 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:05 executing program 0: r0 = syz_open_procfs(0x0, 0x0) r1 = gettid() r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x8000, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r3, &(0x7f0000000340)={r0, r2, 0x20}) prctl$PR_SET_PTRACER(0x59616d61, r1) write$binfmt_script(r2, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xbc, 0x1000000000000008}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0xffff, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r4, r5, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r5, 0x0, 0x2d, &(0x7f00000000c0)={0x0, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r6, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4200, r1, 0x0, 0x0) 20:33:05 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:07 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x74c80, 0x0) ioctl$TCFLSH(r0, 0x540b, 0x2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000040)={{0x3, 0x0, @identifier="19df4d84d8b2d12600"}}) 20:33:07 executing program 0: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c263020f01457e8ffc8cdc1b34c5c1c8db8d336b04b030400000000003576ed3ae7a290ab0e74467713328b5e45772e21da765cd1ce2356a8f87e56f0bf8893cc71495953140000"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0xffff, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x2, r2, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r3, r4, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r4, 0x0, 0x2d, &(0x7f00000000c0)={0x0, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r5, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:07 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001800)=@ipv4_getrule={0x1c, 0x22, 0x2, 0x70bd2d, 0x25dfdbfb, {0x2, 0x14, 0x14, 0x75, 0x0, 0x0, 0x0, 0x4, 0x12}, ["", ""]}, 0x1c}}, 0x0) 20:33:07 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r2, 0xc0405519, &(0x7f0000000240)={0x7, 0x5, 0x6, 0x800, 'syz0\x00', 0x7fff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet_opts(r2, 0x0, 0x0, &(0x7f0000000040)="8c1ac6366207e82a87badba231004f11bf4b971187a889fc3f23903d4195faebbc03bff08930eec598b5b53f1ae7bf1b18283ea0cad4d2", 0x37) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x201, 0x0, 0x0, {0xa}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_NEWCHAIN={0x48, 0x3, 0xa, 0x401, 0x0, 0x0, {0xa}, [@NFTA_CHAIN_TYPE={0x8, 0x7, 'nat\x00'}, @NFTA_CHAIN_HOOK={0x14, 0x4, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}, @NFTA_HOOK_HOOKNUM={0x8}]}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}]}], {0x14}}, 0x90}}, 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)) 20:33:07 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r2, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x8084, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) r3 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$IPT_SO_GET_INFO(r3, 0x0, 0x40, &(0x7f0000000000)={'security\x00'}, &(0x7f0000000080)=0x54) sendto$inet(r2, &(0x7f00000000c0)="dde20f100fc1c79a93edf7e95ad2a3ceb954bf7b28df4f7b25", 0x19, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={r4, @in6={{0xa, 0x0, 0x0, @private1}}}, &(0x7f0000000000)=0x84) setsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000100)={r4, 0x100000, 0x6dd}, 0x10) 20:33:07 executing program 5: unshare(0x40000000) r0 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) r1 = inotify_init() mmap(&(0x7f0000296000/0x2000)=nil, 0x2000, 0x3, 0x8031, r1, 0x2000) syz_open_procfs(0x0, 0x0) r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x8000, 0x0) fchmod(r3, 0x100) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000240)={0x0, 0x1}, 0xc) r4 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r4, 0x29, 0xcb, &(0x7f0000000000), 0xc) 20:33:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000240), 0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000000), 0x8) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x43, 0x0, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r1, r2, 0x0, 0x800009) ioctl$SG_NEXT_CMD_LEN(r2, 0x2283, &(0x7f0000000140)=0xbb) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='dctcp\x00', 0x6) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x8bd54b66}, 0x1c) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000040)={0x2, 'sit0\x00', {0x6a9f}}) pipe(&(0x7f0000001980)) socket$alg(0x26, 0x5, 0x0) pipe(&(0x7f0000001980)={0xffffffffffffffff}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) ioctl$PPPIOCATTCHAN(r3, 0x40047438, &(0x7f0000000100)=0x3) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x100002, 0x0) [ 1504.345528] IPVS: ftp: loaded support on port[0] = 21 20:33:07 executing program 0: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, r2, 0x100, 0x70bd27, 0x25dfdc00, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x1c}, 0x1, 0x0, 0x0, 0x22000000}, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0xffff, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r3, r4, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r4, 0x0, 0x2d, &(0x7f00000000c0)={0x0, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r5, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[], 0x60}, 0x1, 0x0, 0x0, 0x80}, 0x8880) r1 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r1, &(0x7f0000000140), 0xcc, 0x0) [ 1504.522911] IPVS: ftp: loaded support on port[0] = 21 20:33:07 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000000)={0xa, 0x1fd, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f0000000340), &(0x7f0000000400)}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000c88000)={r1, &(0x7f0000847f95), &(0x7f000089b000)}, 0x20) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000240)={0xffff, 0x4, 0x4, 0x8, 0x6, {r2, r3/1000+60000}, {0x5, 0x2, 0x2, 0x5, 0x70, 0xec, "a8b2e780"}, 0x80, 0x2, @userptr=0x7, 0x3, 0x0, 0xffffffffffffffff}) sendmsg$can_raw(r4, &(0x7f00000003c0)={&(0x7f00000001c0), 0x10, &(0x7f0000000380)={&(0x7f00000002c0)=@can={{0x4, 0x1, 0x0, 0x1}, 0x3, 0x0, 0x0, 0x0, "746f296887d72f13"}, 0x10}, 0x1, 0x0, 0x0, 0x20000800}, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000540)=[@in={0x2, 0x0, @local}], 0x10) r5 = inotify_init() read$eventfd(r5, 0x0, 0x0) 20:33:08 executing program 5: io_setup(0x8, &(0x7f0000000280)=0x0) socket$inet(0x2b, 0x801, 0x6eb6) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) r4 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r4, &(0x7f000003bfff)='/', 0x1, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/btrfs-control\x00', 0x10000, 0x0) ioctl$SG_GET_LOW_DMA(r5, 0x227a, &(0x7f0000000400)) r6 = syz_open_dev$tty20(0xc, 0x4, 0x1) fsetxattr$security_ima(r6, &(0x7f0000000240)='security.ima\x00', &(0x7f0000000340)=@md5={0x1, "c89376bc9b9eab5d4fc0482140f31baa"}, 0x11, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r4, 0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r7, r8, 0x0, 0x800009) io_submit(r0, 0x3, &(0x7f0000000300)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x3, 0xf0, r1, &(0x7f0000000040)="a7c2cfc867f1d1c0fed72ae1b13ab4805611e70976b9bae58ff165ba4f3f2bab4848902a7559cd40a9b9950048db3113bd0d9cffd0ffaf1a10feaf92961d613ba9e58ddee47cc8b6d567f503979a45469e9adbe301bdcf2eb36dc8f7d4ca92ce84d8777ee25719659a8c85923f727b106c380550ba8041c0812673d0c5b2e5a107081900abf3e7d5f6aaee4367ccb4f0f1f9dd", 0x93, 0x0, 0x0, 0x2, r3}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x1, r8, &(0x7f0000000140)="e7de09659a66ef684def7a18c712baec67c62c391985b7b0c42e8c26aee73ed9b8c6d256fda396833de9e1bed4deae2edeb2fe48d24c1e60e4b5d1f26c733fa7bed80f876ce0a9c225641f753f28a1aae521ea6cfff0beda024ec83d251c5cc3c319a3bde2088b02d226bdfdc82a11eda0d4fb520301d4885681351c79a1a3836669a084eb4eadd740ebfe643cf2dd7c70151b60d92c9f94775a69", 0x9b, 0x8, 0x0, 0x3, r3}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x8, 0x7fff, r3, &(0x7f0000000240), 0x0, 0x1372, 0x0, 0x1}]) 20:33:09 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:09 executing program 5: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=ANY=[], 0x1) r1 = memfd_create(&(0x7f00000000c0)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f00000008c0)='sessionid\x00') 20:33:09 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x1, 0x6, 0x0, 0x0, 0xfffffffffeffffff, 0x800400}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) setsockopt$inet6_mreq(r2, 0x29, 0x1c, 0x0, 0x0) pipe(&(0x7f0000000140)) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6(0xa, 0x3, 0xfb) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bond0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000000c0)={'bond0\x00', 0x800000000008a03}) 20:33:09 executing program 2: writev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x0, 0x5f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$SO_TIMESTAMP(r2, 0x1, 0x40, &(0x7f00000001c0)=0x6e49497f, 0x4) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000580)=@newqdisc={0x2c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_mq={0x7, 0x1, 'mq\x00'}]}, 0x2c}}, 0x0) sendmsg$inet(r2, &(0x7f0000000300)={&(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x13}}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000040)="6d97c6608e1c764f6217d6d14812e50bf94cbc42e85d3bf7ccbc404b68b4093be042e684f5bf9914990a79e1045c57d6e4f2b46de37c2211256f1848759273f2a7ff8068386245a8ddc12d8db0a31a0533052f0e84313912d9b345dc8e14c23dfd2f73ade6defc40d28b0f15a818bfd137607a792216b78628cdb3811b15231895cd312c5ce78345c5d995cfea42f43d7d8a22634523434dde7c5dd01365d7fe8024fa5bad3c665001b34fa0cd316c8a53431df8cc8eddf656ae436dfb364c84cabfadf012ffd0d985ce06c8f2f1d10baafb8ae5395dafc0ac30af3a1fdb0f5fbdcbbc68eaeddae97e", 0xe9}, {&(0x7f0000000280)="788b0bafdf46caf526730d0c4e21ba345dd799c6eaea93414918942cb8c89db788953eea592751ef07a16be7b22316b111d49f394883678d0618c22d4251e23c18943b2f1bcd87f75756f096bc80aff0080c2b7c01aa32b6c36f6cba2c1bc0", 0x5f}, {&(0x7f0000000380)="163498d6bb30da5e8d694aeb59d7be7da788a88675d1fc65efcf1c648f735f70bbd44f02468b5949f844d443bba18344f14d9bfc7a1e95219c88e21ae25e3b511931b117b5078e6aef686265517a14ebbb7a46a997383033f69e2a5d07966528d37201db29de2ee324d9e93906b8988a5aaf3c28ce414278a28b2d24d1f1e79e4c680877a8", 0x85}], 0x3, &(0x7f00000008c0)=[@ip_retopts={{0xb0, 0x0, 0x7, {[@end, @timestamp_prespec={0x44, 0x24, 0x56, 0x3, 0x5, [{@loopback}, {@remote, 0x3}, {@rand_addr=0x64010101, 0x2}, {@broadcast, 0x5}]}, @timestamp={0x44, 0x1c, 0x5, 0x0, 0x9, [0x6, 0x8, 0x3f, 0x64, 0x2, 0x9]}, @ssrr={0x89, 0x1b, 0x74, [@empty, @dev={0xac, 0x14, 0x14, 0x3a}, @remote, @broadcast, @loopback, @broadcast]}, @end, @timestamp_addr={0x44, 0x34, 0x6f, 0x1, 0x7, [{@local, 0xff}, {@empty, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x5}, {@private=0xa010102}, {@rand_addr=0x64010100, 0x400}, {@private=0xa010101}]}, @generic={0x83, 0xe, "6357f1ae43c1303280ed69d3"}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @rand_addr=0x64010101, @rand_addr=0x64010102}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@rr={0x7, 0x7, 0xb2, [@empty]}, @ssrr={0x89, 0x1b, 0x85, [@remote, @multicast1, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @lsrr={0x83, 0x17, 0xa9, [@multicast2, @remote, @dev={0xac, 0x14, 0x14, 0x1c}, @local, @multicast2]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x4}}], 0x180}, 0x20000000) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYRES16], 0x2}}, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) 20:33:09 executing program 5: mlockall(0x3) mmap(&(0x7f0000539000/0x2000)=nil, 0x2000, 0x0, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0xffffffffffff7fff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$caif_stream(0x25, 0x1, 0x5) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x5a1002, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nvram\x00', 0x8800, 0x0) r4 = getpid() ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) sched_setscheduler(r4, 0x5, &(0x7f00000002c0)) write$cgroup_pid(r3, &(0x7f0000000140)=r4, 0x12) ioctl$DRM_IOCTL_MODE_ADDFB2(r2, 0xc06864b8, &(0x7f0000000080)={0x8, 0x3ff, 0xfffffe01, 0x80000000, 0x1, [0x8c, 0x80, 0x9, 0x40], [0x1000, 0x5, 0x6, 0x3ff], [0x80, 0x287, 0xfff, 0x1], [0x4, 0x1000000000000000, 0x4]}) sendfile(r0, r1, 0x0, 0x800009) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x8, 0x0) [ 1506.291988] 8021q: adding VLAN 0 to HW filter on device bond0 20:33:09 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:09 executing program 2: writev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x0, 0x5f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$SO_TIMESTAMP(r2, 0x1, 0x40, &(0x7f00000001c0)=0x6e49497f, 0x4) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000580)=@newqdisc={0x2c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_mq={0x7, 0x1, 'mq\x00'}]}, 0x2c}}, 0x0) sendmsg$inet(r2, &(0x7f0000000300)={&(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x13}}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000040)="6d97c6608e1c764f6217d6d14812e50bf94cbc42e85d3bf7ccbc404b68b4093be042e684f5bf9914990a79e1045c57d6e4f2b46de37c2211256f1848759273f2a7ff8068386245a8ddc12d8db0a31a0533052f0e84313912d9b345dc8e14c23dfd2f73ade6defc40d28b0f15a818bfd137607a792216b78628cdb3811b15231895cd312c5ce78345c5d995cfea42f43d7d8a22634523434dde7c5dd01365d7fe8024fa5bad3c665001b34fa0cd316c8a53431df8cc8eddf656ae436dfb364c84cabfadf012ffd0d985ce06c8f2f1d10baafb8ae5395dafc0ac30af3a1fdb0f5fbdcbbc68eaeddae97e", 0xe9}, {&(0x7f0000000280)="788b0bafdf46caf526730d0c4e21ba345dd799c6eaea93414918942cb8c89db788953eea592751ef07a16be7b22316b111d49f394883678d0618c22d4251e23c18943b2f1bcd87f75756f096bc80aff0080c2b7c01aa32b6c36f6cba2c1bc0", 0x5f}, {&(0x7f0000000380)="163498d6bb30da5e8d694aeb59d7be7da788a88675d1fc65efcf1c648f735f70bbd44f02468b5949f844d443bba18344f14d9bfc7a1e95219c88e21ae25e3b511931b117b5078e6aef686265517a14ebbb7a46a997383033f69e2a5d07966528d37201db29de2ee324d9e93906b8988a5aaf3c28ce414278a28b2d24d1f1e79e4c680877a8", 0x85}], 0x3, &(0x7f00000008c0)=[@ip_retopts={{0xb0, 0x0, 0x7, {[@end, @timestamp_prespec={0x44, 0x24, 0x56, 0x3, 0x5, [{@loopback}, {@remote, 0x3}, {@rand_addr=0x64010101, 0x2}, {@broadcast, 0x5}]}, @timestamp={0x44, 0x1c, 0x5, 0x0, 0x9, [0x6, 0x8, 0x3f, 0x64, 0x2, 0x9]}, @ssrr={0x89, 0x1b, 0x74, [@empty, @dev={0xac, 0x14, 0x14, 0x3a}, @remote, @broadcast, @loopback, @broadcast]}, @end, @timestamp_addr={0x44, 0x34, 0x6f, 0x1, 0x7, [{@local, 0xff}, {@empty, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x5}, {@private=0xa010102}, {@rand_addr=0x64010100, 0x400}, {@private=0xa010101}]}, @generic={0x83, 0xe, "6357f1ae43c1303280ed69d3"}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @rand_addr=0x64010101, @rand_addr=0x64010102}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@rr={0x7, 0x7, 0xb2, [@empty]}, @ssrr={0x89, 0x1b, 0x85, [@remote, @multicast1, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @lsrr={0x83, 0x17, 0xa9, [@multicast2, @remote, @dev={0xac, 0x14, 0x14, 0x1c}, @local, @multicast2]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x4}}], 0x180}, 0x20000000) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYRES16], 0x2}}, 0x0) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) 20:33:10 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000200)='/dev/input/mice\x00', 0x2) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) r2 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r2, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) fdatasync(r1) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x40200, 0x3, &(0x7f0000002280)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c00fec9000000000100000001000000000700000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x60000004}, {&(0x7f0000000140)="fcba5820c3ef1b77e8a23dd18b16961616356dd7fdeb89769b12def3b6cfd1ab4505524f78c1aa2bf4de120e650f04d278edd8006ad9f89c8b6d8ed96e63d878ff15074525d84e21090fcf500adea45e5683baf409b890f14dec72b7819a765b1f523b740006fa097ad63376050c8f865b5ffbd88b998d1665f951439c15e32429223f310ee8e4d1652b156fd2a1b1c7deec970e41e7a4", 0x97, 0x6}], 0x4801, 0x0) creat(0x0, 0x0) getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) lstat(0x0, 0x0) sendmsg$AUDIT_TRIM(0xffffffffffffffff, 0x0, 0x40480) socket$nl_route(0x10, 0x3, 0x0) [ 1507.730804] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:33:10 executing program 0: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0xb) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0xffff, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x0, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 1507.857547] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1507.902401] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 20:33:11 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000400)=0x1, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000000c0)={{{@in=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x80000000000}, {}, 0x0, 0x0, 0x80000000000001, 0x0, 0x2}, {{@in=@empty, 0x0, 0x6c}, 0x2, @in6=@empty, 0x0, 0x4, 0x0, 0x2, 0xffffffff}}, 0xe8) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r6, &(0x7f00000001c0)={0x0, 0xfffffc38, &(0x7f0000000180)={&(0x7f0000000600)={0xa4, r7, 0x23f, 0x0, 0x0, {{}, {}, {0x13, 0x14, 'broadcast-link\x00'}}}, 0xa4}, 0x1, 0xfffffff0}, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="00002abd70000000000001000000000000000b6164636173742d6c696e6b0000f1a4dedf24994dee7b2b1ac05647ff4146a042413fd62cd62d3a60c503036f0000000000006cdc39db9ddc36f6921043d2eb56f16e4ac4ff034063cccdd90001657a04d7b6b6ef211296598bebcb3543a6d0f79707463b7cb2a514b14793930d88789879554e67bc351e018a17e9dfa0aaa781e99ae42847f9b4819b196b6545"], 0x30}, 0x1, 0xfffffff0, 0x0, 0x20000000}, 0x4) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001180)={0x14, r9, 0x917, 0x0, 0x0, {0x5}}, 0x14}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x54, r9, 0x200, 0x70bd27, 0x25dfdbfb, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x5}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1ff}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @local}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e21}]}, 0x54}, 0x1, 0x0, 0x0, 0x4815}, 0x8000) sendmsg$TIPC_CMD_RESET_LINK_STATS(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)={0x28, r5, 0x20, 0x70bd29, 0x25dfdbfb, {{}, {}, {0xc, 0x14, 'syz1\x00'}}, ["", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000084}, 0x10) sendmmsg(r3, &(0x7f00000004c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) [ 1507.958604] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1508.061473] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:33:11 executing program 3: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, r2, 0x100, 0x70bd27, 0x25dfdc00, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x1c}, 0x1, 0x0, 0x0, 0x22000000}, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0xffff, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r3, r4, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r4, 0x0, 0x2d, &(0x7f00000000c0)={0x0, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r5, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:11 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, 0x1, 0x4, 0x301, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x3}]}, 0x1c}}, 0x0) r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) close(0xffffffffffffffff) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)=0x1) 20:33:12 executing program 2: r0 = socket$inet(0x2, 0x3, 0x2) connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x2e) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r1, 0x0, 0xcb, &(0x7f0000000000)=0x10001, 0x10) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f00000002c0)) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000180)={0x4, 0x4, {r4}, {0xee00}, 0x6, 0xfff}) sendmsg$nl_generic(r3, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x34, 0x3a, 0x200, 0x70bd27, 0x25dfdbfb, {0x12}, [@typed={0x8, 0x4f, 0x0, 0x0, @pid=r4}, @typed={0x8, 0x48, 0x0, 0x0, @uid=r5}, @generic="1b32cc02653ee3d21a39cd3dae"]}, 0x34}, 0x1, 0x0, 0x0, 0x4040080}, 0x40000) 20:33:14 executing program 0: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) wait4(r0, &(0x7f0000000240), 0x1000001, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0xffff, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x0, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:14 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:14 executing program 3: openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nullb0\x00', 0x4400, 0x0) close(r1) r2 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) flock(0xffffffffffffffff, 0x7) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f0000000040)=""/34) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_open_dev$ptys(0xc, 0x3, 0x1) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000500)=0x4) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f0000000780)=ANY=[@ANYBLOB="1c0000002200000008000c0000000000000000006eb408bb5a67a0f367d190756926747f07262ce73c1c7d4c3eb537000000000892a69e5416fb6132d60c30123ef49ffa6ad6b56e2a246b9fc1caec2348aac6609d93f36d7d1351f78119f64f490ec28fcf29d305cd6ea63a2c201813efd7455405b2ea0c73"], 0x1c}}, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000007000/0x1000)=nil, 0x1000, 0x1000009, 0x50, 0xffffffffffffffff, 0xd7ee1000) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r4, 0x0) ioctl$DRM_IOCTL_VERSION(r4, 0xc0406400, &(0x7f0000000000)={0x7, 0x0, 0x81, 0xe2, &(0x7f0000000180)=""/226, 0xe1, &(0x7f0000000280)=""/225, 0xba, &(0x7f0000000380)=""/186}) syz_mount_image$ocfs2(&(0x7f00000004c0)='ocfs2\x00', &(0x7f00000005c0)='./bus\x00', 0xd8, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)="d29095b8c95b36a98a93d48e08cf843d44c27603818ccd5caf3afe326674ac199d1ef7758c4d6dab679049d427e435a9db4ffeaddbceb02f72245136f1701007f006a3268112f0d7f9d21aeddcdb9953707e5b416be958576c125b8b5de5ac6f00ddfc5016d2a979bf59590e35767fee5e5d6f19ec47bbce186aa33571313a0cd77f652a62fb2d77838d12ba1785a7c634bb4a471dc1cb1a5f2527b23a9edaacd2b501476d1c471941cee018c9529302e9e087077697dd919e18e83eaf1fc0db4f86e76ca7370a0db7cd2d02b515c1195a60a57146b92e6278", 0xd9, 0x7fff}], 0x18, &(0x7f0000000740)='!Hem1}\x00') [ 1511.570732] (syz-executor.3,27565,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "!Hem1}" or missing value [ 1511.587165] (syz-executor.3,27565,0):ocfs2_fill_super:1225 ERROR: status = -22 [ 1511.687852] (syz-executor.3,27572,0):ocfs2_parse_options:1499 ERROR: Unrecognized mount option "!Hem1}" or missing value [ 1511.736111] (syz-executor.3,27572,0):ocfs2_fill_super:1225 ERROR: status = -22 20:33:21 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:21 executing program 3: sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[@ANYRESDEC, @ANYBLOB="00000000000000000000110000002c00038008000200000000000800020000000200000000000000010000800c0001006574683a776731002400038008000300000000000800010000000000085e15020f00000008000100000000003000058008000100756470001c0002800800020000000000080001000000000008000200000000000800010065746800a4d528"], 0xa4}}, 0x0) r0 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) fchmod(r0, 0x172) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a943", 0x79, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 20:33:21 executing program 0: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0xffff, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x0, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:21 executing program 2: pwrite64(0xffffffffffffffff, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000180)=@kern={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000240)=[{&(0x7f0000003280)={0x2484, 0x1d, 0x400, 0x70bd25, 0x25dfdbfc, "", [@generic="489a3defbf52202823b69a24680d8430e97db4c5619a6d4edebfa7cca8b7725e41c1c223af55e7fefd129c24a133afe2e427f1f1f6c60ac663cfc6c99ed8b3258675d6ec58f845faa8ed9d2be234c8de33", @generic="de3beceed804e878a432d0cbe84ccf7acef637791dbaa2f1fb2636410053d0628bd6455129c79438a4ec6cb2a41a1a768e9cc6634655a72fdf3c90eba74817c5585d7167227839cd2c2c9b1ef9f1c2eb8f1cc1b3331035", @nested={0x14, 0x81, 0x0, 0x1, [@typed={0xf, 0x63, 0x0, 0x0, @str='!bdevwlan1\x00'}]}, @nested={0x331, 0x7b, 0x0, 0x1, [@generic="1dd37a066b3975102cc469a170dd1691d90b843c55a63df60f84655b90dcd376e211bb4f11732ae7f004be1f0239e121c95a2de40b8bf048b7dd0d7702bc042a026bcbe178b843aec3f986f04b7c5401c2066753caccceb0e9d7cc4615ed4e17e6cc356bed8fd5a9f4d81b9d50742b361443a7dadc413e46fcad4fde153bcdfe277b2fd79474539c712c6199e4166ca61def8a5af9353155a246c83b1788a92704e9d5e21ff45277765586c9095679abcb3f019065", @generic="c85edf1d5f3ea52187", @generic="ca7501549fdee258d436c0a6eec59f2f09811c87dbe0bddc32fae110baface7f2b591fc78a87f3836afb9bcf33d30ceca0fc649ee03af50ca78066d4494b2566019794729da2136a9e68a0650b959d67b47ed03b022d04d24f2ac7275ab0d33de8620f8d387d37f01480e3fa6f404844df3b5f8d55523eb40e266e803096eee06091a0ac3d3c82287719c620590a2d604e66bacf3529eba3a79b20c44c657110fcba8655dfa4a091186c0f4c9e60c42a72c097e1981fa4b1b1c5b93fbb7409f822767e2d064fce7801cbd6f166350060c1122819fe0c99b077a4bd394e", @generic="9cbaf75405f82dc6392a25cdc93898b7c647e5446d3d604d2dd91c4249a3f22616dacb9c62c1a4d9c54cdbd103bb0e7a10f8af5833dacad131d81e394b20956a1756519756d21836f9ec9dd20ce13110807f2a825360cc45ad318fd3742040bf90bb16da2d7d015852fc2895b486db100e4aae5acbfa137a8c17a26d923831bc61a641bccb1feeb8065f5feedf8f478b059e4fb208ab2e423b56690844f4311615c4680ea60f4aa9dcf3edba1f89e3e98c1147d667bd8b516490cee4f4d3119899c477e7949ecb5c80bd2dfacfd1a2c7b739b195da45ff306eebe3f25d5aafd59d9da887e5563ea6", @typed={0x8, 0x8, 0x0, 0x0, @fd}, @typed={0x14, 0x5, 0x0, 0x0, @ipv6=@private1}, @generic="7544353f87b5ccffaddc4c11f1156cd5a3bdc9d6601dac7961cfeb9f87db8a8cd2909d344394567e680a86a6fd3f60f9c87b580a0def1b5fea83bf4b9a033c56bebba434400641f824301e55c9c22c500a76e6d5bed75fb2d94fdf3ad4dbdbad83cc76a1dd6427bc6bcbb963f505b81c29a9931c468a9eaed4f76c4a16f2267f59e2", @typed={0x8, 0x33, 0x0, 0x0, @pid}, @typed={0x4, 0x76}]}, @generic="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", @typed={0x1004, 0x5, 0x0, 0x0, @binary="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"}, @generic="ffa5e5b49b66b2c07731a575ad4c4c0b2624ba886f246fba378c9c676f7ab9817c0ff5154c1cab1315e2baaaa0a45b247dcb1ca5db1b84fd130a1e1b0264b7728f17cceedec300a82a1bde45c08e4041f7665369706b6d1f6549915994dc34cef315da73acfed667f18d0c424ce87233f8751a61ad3c5b613cc0a02360bbfb50"]}, 0x2484}, {&(0x7f0000001cc0)={0x554, 0x36, 0x1, 0x70bd2a, 0x25dfdbfb, "", [@typed={0x6, 0x8b, 0x0, 0x0, @str='#\x00'}, @generic="8f3783336dd54e3beef1426515ee3cc0cc156ae9a903e50b030fdc605af152d6163594f02e9d47daaad227b0e3e321a6843fed4483bb0a45807b58699c1487a872815bc0bf2261d52ad5f05130d82693ad2f31293c67b56fda611d549d428c11310961bdf54c2400f0b992ccd0d36dc719be926d5fe85cb84725c9c47b0604fafa4fcfd99de9d475577450ce886b23be5a3f179b4d1fed403048c8848529968b2495ffc1887eca49762835cde8f26687de6a280979e37245026bd4c68c491772ca1d2f255b7c15e34f77e4a5147b74d63d6b4244e7283f7017d2a7915c", @typed={0x8, 0x16, 0x0, 0x0, @uid}, @typed={0x14, 0x78, 0x0, 0x0, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}, @nested={0x1b2, 0x1a, 0x0, 0x1, [@typed={0x8, 0x4d, 0x0, 0x0, @pid}, @typed={0x8, 0x2c, 0x0, 0x0, @pid}, @typed={0xb, 0x1, 0x0, 0x0, @str='vxcan0\x00'}, @generic="b3208635e4c0fb699a4a575ae86017694609311356f308cd66c9301bed93c38c0b8c2b6a6b6c1379e05007121f4053535719d456fc26b231d6c7a5e1a67979370639eddce1d9dd117cf8959f310dae0c35cd1c4a09413e4923acfa9cb8e47a489736948cd573100a9642409ea6f56532d0652c7e1e6a2e826363163fb13afeab4cc965ab7069558eb151f02e2d863fbf8196b0fb40357d6b02b69e2ccab771f4d972dbb6fbaa4cf7dd1c98f7b18128e4a08d0f22a4b65a1e8758b0fe673d0b1cc403acb784890dd4590f0496108e072092c09fe20eb25ed95a1784c97e4e2f015cf19c1cc7dbbb7ae43b516f0d", @typed={0xd, 0x6f, 0x0, 0x0, @str='vboxnet0\x00'}, @generic="360c72c6ffa07d4a2cbd6f6d94987ed4a690fc7aed4c09465115e3afc7f70d6c", @typed={0x8, 0x89, 0x0, 0x0, @u32=0x7}, @generic="28340f42193c3d27ae7406f585dbf6e52452524e2c39f9590347ec511a5e4e2b9b16055c91a3bc6f5d6f19b23f216db9ede767f7763eb77bd9f6cce33cd3273bcb46ff5fe72c215b6b329580ceb7a57c845e8c36fe11b7b21b4c2dde1d25c25987d6997cdd42d84b14a3c7c3fb"]}, @typed={0xc7, 0x2, 0x0, 0x0, @binary="7c8de6f63a29f323c14403eea0afbe33a022291cae946e92c862bd9f04d9575fcc24daaa47df636b300c0d239f11274161d4edafd708618328ed9574cb007ebdf5761b073a72583917bced9996ce949e0db22f8fc8ced7efe1d448492413523f51965117ae60cf8ebe1f8d111f6bb1ce0f714e7689fe2fc5a3832b739abca19efc82ffe9e7d14f4d88360c90703991e1e1de0f3bd55d23edbf1f26888e11e7e569d28ab4d25cdf5b61300a1cb19076d9043ae584105b116ff6dbfb1757bd8782f84953"}, @typed={0xc, 0x6e, 0x0, 0x0, @u64=0x3ff}, @nested={0x1b7, 0x53, 0x0, 0x1, [@typed={0x8, 0x84, 0x0, 0x0, @fd}, @typed={0xc, 0x94, 0x0, 0x0, @u64=0x4}, @generic="4742206e8017db9847eaed4185fdb6e0957309ed8a3c8e5b788bf01d19b88890691559d1930fb5f6d15ab42e5a071bfc5dd7d1e7c8f8e1941d99e29e083b99603388de17768908baedd8c720dace82b62de40105e263329f51f9ed276e1db2f4b27ec3f837e17898e08debb4e222bf7c70773e14e278d14103dc19c353b6b52e4b33cf015a832c836c077087f3b00191a5eed33d37f1c7578662a5933a7d5f4cce2afcf085ce01a44b30cffc0584be2e311866d2f6fbc6a7a3b6", @generic="44fa21b31f6b770d12732457d4c99065bcb91491be351b77cc37f800728cad5bb1d31113615bfb19d8655ef2449d8149c415c5fb7dd9f9a64d4cc6d89611d46f1dc12d7be0ec608592aa6bca9fa880c3ce0b1c8f247b4c439385b41ae49d3c63c2b1a0394a8575fdb7763fbf10d5b21256b5f43044636b1806352efab40c", @generic="26c50732b13d647a44b30a9b7a8a7a0fa1e3e7650e63e584fe95b5b9a0781c53918c859a412befccfbc35ba6eb0d8ae3f39ea7f0f38a85d127687629875d72a68a08ba07a320f4fbfe4b1645a32fd2c6fe1a59613ae48623b54f80818c1f62ce50018e1e20617e"]}, @generic]}, 0x554}, {&(0x7f0000002240)=ANY=[@ANYBLOB="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"], 0x1024}], 0x3, &(0x7f0000000600)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r0]}}], 0x78, 0x800}, 0x240580d2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000000}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x2c) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0c480e0028000000e8bd6efb250309000e000100244e48ff050005001201", 0x2e}], 0x1}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r3, r4, 0x0, 0x800009) setsockopt$SO_TIMESTAMP(r3, 0x1, 0x40, &(0x7f00000001c0)=0x6e49497f, 0x4) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000300)=@pppoe={0x18, 0x0, {0x1, @multicast, 'syzkaller0\x00'}}, 0x80) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=ANY=[@ANYBLOB="2c00000024000b0f000000000000210000000000623af5ee23349e0fcd94", @ANYRES32=r6, @ANYBLOB="00000000f1ffffff00000000070001006d710000"], 0x2c}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000480)={'vxcan0\x00', r6}) setsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f00000004c0)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', r8}, 0x14) 20:33:21 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') sendfile(r0, r1, 0x0, 0x800009) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x280000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='projid_map\x00') sendfile(r3, r4, 0x0, 0x800009) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f0000000080)={0xf09, 0x5, 0x0, 0x10001, 0x0}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f00000000c0)={0x7, 0x1ff, 0x33f, 0x0, r5}) [ 1518.346969] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 20:33:21 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) perf_event_open(&(0x7f0000348f88)={0x2, 0x9d, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, r1, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$kcm(0x29, 0x5, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) 20:33:21 executing program 5: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fstat(r2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r3, 0x0) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r7 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r7, r5, r6) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r3, r6, 0x1000) sendfile(r0, r1, 0x0, 0x800009) ioctl$SIOCAX25OPTRT(r1, 0x89e7, &(0x7f0000000000)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, 0x2, 0xde}) r8 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r8, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r8, 0x1d7) r9 = socket$inet_sctp(0x2, 0x801, 0x84) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r9, &(0x7f0000000180)={&(0x7f00000009c0)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f0000000980)=[{&(0x7f0000000a40)="b2", 0x25}], 0x1, 0x0, 0x0, 0x9000004}, 0x0) [ 1518.429505] EXT4-fs (loop3): bad geometry: block count 1080 exceeds size of device (1 blocks) [ 1518.490158] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 20:33:21 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@ipv4_newroute={0x40, 0x18, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@RTA_ENCAP={0x1c, 0x16, 0x0, 0x1, @nested={0x18, 0x6, 0x0, 0x1, [@typed={0x14, 0x0, 0x0, 0x0, @ipv6=@ipv4={[], [], @dev}}]}}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}]}, 0x40}, 0x1, 0x0, 0x0, 0x20000050}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r4, r5, 0x0, 0x800009) renameat2(r5, &(0x7f0000000040)='./file0\x00', r1, &(0x7f0000000080)='./file0\x00', 0x5) r6 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 20:33:21 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x14042, &(0x7f0000000600)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030300600000000000000302c757365725f69643d", @ANYRESDEC, @ANYRESHEX, @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000380)=[{&(0x7f00000003c0)=""/104, 0x68}], 0x1, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsu\x00', 0x10300, 0x0) ioctl$TIOCCONS(r1, 0x541d) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1e}}, 0x50) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r5, r6, 0x0, 0x800009) ioctl$VIDIOC_S_JPEGCOMP(r6, 0x408c563e, &(0x7f0000000540)={0x1, 0x3, 0x34, "2d83636502436f5234bbd0d3f0aade4c2d1cc68ac4e39a49e24ae20cde355305b8e8c561822d4e2cf6d692acb403f156316a905793adba33ba5f17a1", 0x24, "4837fe12f196c9f2ff17c75d88e1003d47090c2fba09f8853ddcbc22074ceb97c17259d5190d949fe7c4ab38f55f81038c99f71ea9c265960eb6a46f", 0x2c}) write$FUSE_OPEN(r0, &(0x7f0000000000)={0x20, 0x0, 0x2}, 0x20) r7 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/btrfs-control\x00', 0x200000, 0x0) ioctl$VHOST_SET_VRING_ERR(r7, 0x4008af22, &(0x7f0000000300)={0x2, r1}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x80086601, 0x0) 20:33:21 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fstat(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fstat(r2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r3, 0x0) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0xfffffffffffeffff, 0x3, &(0x7f0000000200)=[{&(0x7f00000000c0)="e340948b3b6388b18e03c38025d2fc6ac60aae2e872b056921f0776436c0c9bf42621949b824af46e0a2ce3fcc02a2b0", 0x30, 0x9}, {&(0x7f0000000100)="f886b25fec610e5cacc60e8ce7896f2028618d02695e46b0736213c29334698abed358bd059ffdfc97ba34ed8f5fdc92b5a4e5e721001d123a4c5c101c7b829215185814fd81d0df", 0x48, 0x2}, {&(0x7f0000000180)="08c196511f107ca6065abd6f7094eb756afba3051c0f2a1f185f9aba3a6c7e9232bb4e0e8c68560826d4bb64c2cfd399dc6912d87c7a8daf89389bee2519053af384a000ff21f5424ec3322a59846d245e3f5697161bdeec80718f62dc7e5efc8579ccc57892a81938f0c0431539c1f32164c8bcf183196dcc98dc71ac044a", 0x7f, 0x10000}], 0x10000, &(0x7f0000000280)={[{@fat=@nfs='nfs'}, {@nodots='nodots'}, {@dots='dots'}, {@fat=@flush='flush'}, {@fat=@umask={'umask', 0x3d, 0x3}}, {@dots='dots'}, {@nodots='nodots'}, {@fat=@time_offset={'time_offset', 0x3d, 0xfffffffffffffa8f}}, {@nodots='nodots'}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'children\x00'}}, {@uid_lt={'uid<', r1}}, {@uid_eq={'uid', 0x3d, r3}}, {@obj_type={'obj_type', 0x3d, 'children\x00'}}, {@smackfshat={'smackfshat', 0x3d, 'children\x00'}}]}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r4, r5, 0x0, 0x800009) 20:33:21 executing program 3: socket$netlink(0x10, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = socket$inet_dccp(0x2, 0x6, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r4, @ANYBLOB="ffff09000000b4000a00", @ANYRES32=r1], 0x4}}, 0x0) sendfile(r3, r2, 0x0, 0x100000002) [ 1518.819623] FAT-fs (loop1): Unrecognized mount option "smackfstransmute=children" or missing value 20:33:22 executing program 2: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x40096101, 0x0) io_setup(0x100, &(0x7f0000000080)=0x0) r1 = socket(0x40000000015, 0x5, 0x0) io_submit(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000000), 0x8) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) ioctl$VIDIOC_SUBDEV_S_CROP(r3, 0xc038563c, &(0x7f00000000c0)={0x0, 0x0, {0x4, 0x0, 0x677, 0x4}}) sendmmsg$inet_sctp(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 1518.849594] audit: type=1804 audit(5885210001.983:198): pid=27795 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir017937193/syzkaller.bZbNRC/1026/cgroup.controllers" dev="sda1" ino=17864 res=1 [ 1518.938438] FAT-fs (loop1): Unrecognized mount option "smackfstransmute=children" or missing value [ 1519.139772] audit: type=1400 audit(5885210002.273:199): avc: denied { read write } for pid=27792 comm="syz-executor.3" path="socket:[195274]" dev="sockfs" ino=195274 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dccp_socket permissive=1 20:33:24 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:24 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) sched_setattr(r0, &(0x7f0000000140)={0x38, 0x1, 0x10000037, 0x7, 0x9, 0x7, 0x2, 0x88d, 0x80000001, 0x1}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') r3 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@hci, &(0x7f00000000c0)=0x80, 0x0) bind$bt_rfcomm(r3, &(0x7f0000000100)={0x1f, @fixed={[], 0x12}}, 0xa) sendfile(r1, r2, 0x0, 0x800009) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r4, r5, 0x0, 0x800009) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r6, r7, 0x0, 0x800009) ioctl$KDGKBMODE(r7, 0x4b44, &(0x7f0000000240)) sendto$rose(r3, &(0x7f0000000640)="b87e0437ce5f692af5040bc99d05093081503b425f5f5139b4a482fadd752523e90dde56cc8d0ffe0d39c4f27f7e8aed17f6705a4be74d16ef990e66f639f0d5527cf611d667c9db3c82fa500339e91ea8bfb23ae028d29dca8805b3b421eb8be5288ce9b205cc2d3c2dd69769", 0x6d, 0x40801, &(0x7f0000000280)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x1, @bcast}, 0x1c) sendmsg$NFT_BATCH(r5, &(0x7f0000000200)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000001c0)={&(0x7f0000000300)={{0x14}, [@NFT_MSG_NEWCHAIN={0x54, 0x3, 0xa, 0x5, 0x0, 0x0, {0x7, 0x0, 0xa}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_HOOK={0x28, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'ip6gre0\x00'}, @NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x3}, @NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x4}]}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_NEWRULE={0x64, 0x6, 0xa, 0x801, 0x0, 0x0, {0x0, 0x0, 0xa}, [@NFTA_RULE_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_RULE_USERDATA={0x35, 0x7, 0x1, 0x0, "46d0c757b550849c353d311926e8369abec2b2baf4f86a6ff4552195fedb0d8bcc4542acc3f37b93d174b540c25d794877"}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFT_MSG_DELTABLE={0x20, 0x2, 0xa, 0x201, 0x0, 0x0, {0xb}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x14, 0x3, 0xa, 0x801, 0x0, 0x0, {0x2, 0x0, 0x4}}, @NFT_MSG_NEWFLOWTABLE={0x30, 0x16, 0xa, 0x201, 0x0, 0x0, {0x0, 0x0, 0x5}, [@NFTA_FLOWTABLE_HOOK={0x1c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x3f}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_NEWSET={0x44, 0x9, 0xa, 0x201, 0x0, 0x0, {0xc, 0x0, 0x8}, [@NFTA_SET_ID={0x8}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_DATA_LEN={0x8, 0x7, 0x1, 0x0, 0x37}, @NFTA_SET_GC_INTERVAL={0x8, 0xc, 0x1, 0x0, 0x900000}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x168, 0x16, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_HOOK={0x144, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x6}, @NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'vxcan1\x00'}, {0x14, 0x1, 'wg1\x00'}, {0x14, 0x1, 'macvtap0\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x40, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth1_to_bond\x00'}, {0x14, 0x1, 'wg1\x00'}, {0x14, 0x1, 'bridge0\x00'}]}, @NFTA_FLOWTABLE_HOOK_DEVS={0x7c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'wg0\x00'}, {0x14}, {0x14, 0x1, 'bridge0\x00'}, {0x14, 0x1, 'bridge_slave_0\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'batadv0\x00'}]}, @NFTA_FLOWTABLE_HOOK_DEVS={0x2c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'ip6erspan0\x00'}, {0x14, 0x1, 'vlan0\x00'}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x128}]}, @NFTA_FLOWTABLE_FLAGS={0x8}]}, @NFT_MSG_DELSET={0x30, 0xb, 0xa, 0x101, 0x0, 0x0, {0x7, 0x0, 0x2}, [@NFTA_SET_HANDLE={0xc, 0x10, 0x1, 0x0, 0x2}, @NFTA_SET_OBJ_TYPE={0x8, 0xf, 0x1, 0x0, 0x7}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}]}, @NFT_MSG_NEWCHAIN={0x14, 0x3, 0xa, 0x301, 0x0, 0x0, {0x7, 0x0, 0x5}}], {0x14}}, 0x334}, 0x1, 0x0, 0x0, 0x4044}, 0x4800) 20:33:24 executing program 0: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0xffff, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x0, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:24 executing program 2: r0 = socket$inet6(0xa, 0x80000, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r3, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r3, 0x0) write$binfmt_misc(r3, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0xf5) sendmsg$BATADV_CMD_GET_GATEWAYS(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=ANY=[@ANYBLOB="3579bbc4daed54c1ff7f0000c64d9357179b8edf5ec31e98b83f2cbd89e667c6ac8f7ddc91994c00750277cd2a5a78ad43fba832d083ba7e6cdb78c28fb9da43ece0d208f82d9ca6a1605bb078a303d4ed22", @ANYRES16=0x0, @ANYBLOB="1100286c6d726d70d4a74a0003000000000000000000000094b09e196e6489ebb296f11833b2d16d6b59991e2602991ff431272237c0549180a95e727a0484d0f368b4020c9406655b8cf7322557fd", @ANYRES32=r3, @ANYBLOB="2e5f04c67d86152f2e9de46580c3a20d9b846c4b27f8f0712efc49a81b6fd49cbc281cfc6d776be62c98e0b00e21117c137a2bed08974c3103e4b37bd4b3a8"], 0x1c}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r4, 0xffffffffffffffff, 0x0, 0x800006) accept4$packet(r5, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000200)=0x14, 0x80800) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="2a68ffff", @ANYRES16=0x0, @ANYBLOB="00042cbd7000fddbdf250a00000008000600", @ANYRES16, @ANYBLOB="050033000000000005002f00000008003200060000000500290001000000"], 0x44}, 0x1, 0x0, 0x0, 0x40040}, 0x40008) r6 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r6, 0xae60) ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000000400)=0x6, 0x8) ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x200000001) syz_init_net_socket$x25(0x9, 0x5, 0x0) 20:33:24 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = dup(r1) ioctl$DRM_IOCTL_ADD_BUFS(r0, 0xc0206416, &(0x7f0000000040)={0xaa2, 0x55c, 0x1c0000, 0x3, 0x18, 0x7}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)={0x34, 0x0, 0x8, 0x101, 0x0, 0x0, {}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x84}, @CTA_TIMEOUT_DATA={0x4, 0x4, 0x0, 0x1, @icmp}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x2}]}, 0x34}}, 0x0) sendfile(r4, r3, 0x0, 0x100000001) 20:33:24 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x40, &(0x7f00000001c0)=0x6e49497f, 0x4) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, r3, 0xfff, 0x6, 0xffffffffffffffc1, 0xff}) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x101800, 0x0) unshare(0x0) [ 1521.430288] audit: type=1804 audit(5885210004.563:200): pid=27895 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir017937193/syzkaller.bZbNRC/1027/cgroup.controllers" dev="sda1" ino=17869 res=1 20:33:24 executing program 0: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x800009) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240), 0x10) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x48, 0x6, 0xffff, 0x8, 0x5, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0xa) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x0, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x4, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:24 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000040)={0x7, @raw_data="2f807c10ba5b72fa27acb8ed77f864a13c67fedf2a5ed403103180409beb51f0b5441a1021e99ba48126cc7ad64590195051d8eb430f00281f54b32f65ba89b5f5b9b1891865cc801dc61679f33fb47221e0ac12f6b4a4cae0845a8607ee0c11fb14a6a9adc852075830edb328bb065fbb35f63e1936f341a9905b11a9c7473a657d82cf06dbe02a746e3ce017c122006561577fc1ed16d4bb5a824194f17a92a34f14861766abd021311c70ad151180cd8956796ee6a0996bd03ce89bd6c8b16086d44cc6bd8509"}) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0x402840, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x43, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000540)={0xd0, 0x0, &(0x7f0000000400)=[@acquire_done, @exit_looper, @request_death={0x400c630e, 0x1}, @release, @reply_sg={0x40486312, {0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x48, 0x18, &(0x7f0000000180)={@fd={0x66642a85, 0x0, r2}, @fd={0x66642a85, 0x0, r3}, @flat=@binder={0x73622a85, 0x14}}, &(0x7f0000000200)={0x0, 0x18, 0x30}}, 0x1000}, @clear_death={0x400c630f, 0x3}, @reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x58, 0x18, &(0x7f0000000340)={@flat=@handle={0x73682a85, 0x1, 0x2}, @ptr={0x70742a85, 0x0, &(0x7f0000000240)=""/247, 0xf7, 0x0, 0x3f}, @flat=@weak_binder={0x77622a85, 0x1000, 0x2}}, &(0x7f00000003c0)={0x0, 0x18, 0x40}}}], 0x1b, 0x0, &(0x7f0000000500)="e0703a132ca76b1f3695cb5f2d71d275b7b6d2f49423974548c1c5"}) fchdir(r1) 20:33:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r1, r2, 0x0, 0x800009) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r3, r4, 0x0, 0x800009) getpeername$packet(r4, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f00000002c0)={@private1={0xfc, 0x1, [], 0x1}, 0x7, r5}) r6 = fcntl$dupfd(r0, 0x0, r0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x800009) ioctl$USBDEVFS_GET_CAPABILITIES(0xffffffffffffffff, 0x8004551a, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x800, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000040)="600084e002000a00900cda40ff0100c98f133f", 0x13, 0x400}, {&(0x7f0000000980)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9372839935512a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f2592785d5de5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e6ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24c", 0x306, 0x34fc}], 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x36, 0x1) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_REVISION_TARGET(r7, 0x0, 0x43, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) fcntl$dupfd(r6, 0x0, r7) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video37\x00', 0x2, 0x0) 20:33:25 executing program 2: getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_dev$dmmidi(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x800009) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f00000002c0), &(0x7f0000000340)=0x4) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) writev(r1, &(0x7f0000000400)=[{&(0x7f00000001c0)="1cdf66", 0x3}, {0x0}], 0x2) close(r1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000040)={@dev={0xfe, 0x80, [], 0x17}, 0x0, 0x0, 0x3, 0x0, 0x8100, 0x7}, 0x7c) sched_getaffinity(r0, 0x8, &(0x7f0000000100)) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000080)={0x0, @rand_addr, @multicast2}, &(0x7f00000000c0)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000300)='net/tcp\x00') r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$TIOCL_SETVESABLANK(r1, 0x541c, &(0x7f0000000140)) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) [ 1522.000209] XFS (loop5): Mounting V4 Filesystem [ 1522.017369] MINIX-fs: mounting file system with errors, running fsck is recommended [ 1522.071919] XFS (loop5): totally zeroed log [ 1522.090849] XFS (loop5): Metadata corruption detected at xfs_agi_verify+0x113/0x550, xfs_agi block 0x2 [ 1522.122356] XFS (loop5): Unmount and run xfs_repair 20:33:25 executing program 3: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) renameat2(r0, &(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r1, r2, 0x0, 0x800009) ioctl$VIDIOC_G_FBUF(r2, 0x8030560a, &(0x7f0000000080)={0x20, 0x8, &(0x7f0000000040)="452e1c14a9eed339", {0x7, 0x3f, 0x37303250, 0x2, 0x1f, 0x3, 0x3, 0x80000000}}) mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0*\x00']) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x2000, 0x0) umount2(&(0x7f0000000300)='./bus\x00', 0x0) [ 1522.146706] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 1522.159691] 000000001fe882ea: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1522.181538] minix_free_inode: bit 1 already cleared [ 1522.235156] 0000000059f4fc9e: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1522.261197] 0000000005a0982b: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1522.286068] 000000007e5b50fd: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1522.311375] 00000000961f5f46: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1522.348206] overlayfs: failed to resolve './file0*': -2 [ 1522.353922] 000000003b9f842f: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1522.393033] 000000009db2ec4d: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1522.422257] overlayfs: failed to resolve './file0*': -2 20:33:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x9, 0xd19f}) add_key(&(0x7f0000000040)='blacklist\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f0000000280), 0x0, 0xfffffffffffffffe) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/urandom\x00', 0x80000, 0x0) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000440)=0x4) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r2, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000480)="ab130005258bdaec910b9088d6fae452af105368887a0dd4f772856a2d3fa47087772d2967040ee7dca94a295e217dc30a56f499b3146845866256634e9d7f989bc80ae48a87b1268f11490c35fcec9968daf6b0b4186682852d1641b777743cefc868f8e0c22e93abab3b6bac205e183a932959d851c88c5ad9e299e1232020e8b7e8679247c70635ad06205741d9f33149fc00a06d29399956804a72098b15f3e496dbc6c648abe5d63275464d41416af0ddb61c20e1a417f285dbb42f9002597532ff673eadcaf69b55e346992e519bd43799738bb32174033131c1ac89f81f0b40", 0xe3) prctl$PR_SET_TIMERSLACK(0x1d, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x24000000) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = getegid() setgroups(0x1, &(0x7f0000000200)=[r3]) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), &(0x7f0000000140)=0x4) r4 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/diskstats\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x4000000000010046) mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./bus\x00', 0x42) [ 1522.449062] 00000000e0727d29: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 1522.512916] XFS (loop5): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 1522.558352] XFS (loop5): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 1522.585164] XFS (loop5): Failed to read root inode 0xd88, error 117 20:33:27 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:27 executing program 2: getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_dev$dmmidi(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x800009) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f00000002c0), &(0x7f0000000340)=0x4) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) writev(r1, &(0x7f0000000400)=[{&(0x7f00000001c0)="1cdf66", 0x3}, {0x0}], 0x2) close(r1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000040)={@dev={0xfe, 0x80, [], 0x17}, 0x0, 0x0, 0x3, 0x0, 0x8100, 0x7}, 0x7c) sched_getaffinity(r0, 0x8, &(0x7f0000000100)) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000080)={0x0, @rand_addr, @multicast2}, &(0x7f00000000c0)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000300)='net/tcp\x00') r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$TIOCL_SETVESABLANK(r1, 0x541c, &(0x7f0000000140)) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 20:33:27 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xbb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x18040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000001}, 0x10905, 0x0, 0x0, 0x0, 0x800000000}, 0x0, 0xffffffffff7ffffb, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x3, 0xffffffffffffffff, 0x0) uname(0x0) perf_event_open(&(0x7f0000000440)={0x4, 0x70, 0xbb, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x100000001}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x10040}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x8000400) r0 = mq_open(&(0x7f0000000100)='-$\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) fadvise64(r0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x6, 0x0, 0x0, 0x41c2, 0x5a10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1c28, 0x3ff, 0x0, 0x800, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000140)={&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ff9000/0x7000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000004c0)}, 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r2 = syz_open_dev$vcsu(&(0x7f00000001c0)='/dev/vcsu#\x00', 0x4, 0x8400) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) r3 = getpid() tkill(r3, 0x9) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000000)=""/57) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa0434, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000005, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x9, 0x9}, 0x0, 0xffffffffffffffff, r1, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x4, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x81, 0x5}, 0x40442, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000002, 0x11, r5, 0x97a08000) sendto$inet(r4, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0xe00000000000000, 0x0, 0xffffffffffffffc2) 20:33:27 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8208, 0x0, 0x0, 0x0, 0xc6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) sendmsg$kcm(r3, &(0x7f00000001c0)={&(0x7f0000000040)=@ax25={{0x3, @bcast, 0x8}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @default, @bcast, @null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x80, &(0x7f0000000180)=[{&(0x7f00000000c0)="1968c67be3f9", 0x6}, {&(0x7f0000000100)="b6b9dab2c4b92383330ab5e8fe1c89a74ba3bffc7f05fb137a26521ad46046b2b4af2dde281b9b256c45d2cfc71c4846b2694e3b5ca9b9d7f040d97f623b85a634281f7648e652d79f7ae83cde841c166c2b24932c57906f5ee11001d22e2e3a3d2ea2ec", 0x64}], 0x2}, 0x4800) 20:33:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x9, 0xd19f}) add_key(&(0x7f0000000040)='blacklist\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f0000000280), 0x0, 0xfffffffffffffffe) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/urandom\x00', 0x80000, 0x0) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000440)=0x4) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r2, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000480)="ab130005258bdaec910b9088d6fae452af105368887a0dd4f772856a2d3fa47087772d2967040ee7dca94a295e217dc30a56f499b3146845866256634e9d7f989bc80ae48a87b1268f11490c35fcec9968daf6b0b4186682852d1641b777743cefc868f8e0c22e93abab3b6bac205e183a932959d851c88c5ad9e299e1232020e8b7e8679247c70635ad06205741d9f33149fc00a06d29399956804a72098b15f3e496dbc6c648abe5d63275464d41416af0ddb61c20e1a417f285dbb42f9002597532ff673eadcaf69b55e346992e519bd43799738bb32174033131c1ac89f81f0b40", 0xe3) prctl$PR_SET_TIMERSLACK(0x1d, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x24000000) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = getegid() setgroups(0x1, &(0x7f0000000200)=[r3]) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), &(0x7f0000000140)=0x4) r4 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/diskstats\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x4000000000010046) mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./bus\x00', 0x42) 20:33:27 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x88, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x1f, 0x1, 0x3, 0x9, 0x0, 0x21da9f12, 0x800, 0x7, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x6, 0x919}, 0x800, 0x4, 0x20, 0x9, 0x9, 0x7ff, 0x101}, r0, 0xb, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f00000000c0)={{0x1, 0x0, @identifier="00be170b2a831ff5d924079e1ee5d11a"}, 0x58, [], "f07c8df71561ad6bb25d9372fdf24225771c1e48cefda9c28bf6dcd9b6b0e25803e6b120d5985bd33009df0e7ac47c6beea6f484c951dd25bab46815928af6f3d8651baf4b2d92cc2b1472aa61b236818164eabb681277a5"}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) 20:33:28 executing program 0: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a63c15ceda021da765cd1ce2356a8f87e56595314efd906111ec0d0bab701fff4313fcb2694cab4bf01e96e752320312408fdd81b9f52022d61884cf238e962912754346d3935f79c5821ca3a58bb518b05ffa9090626ecf1b30aca9aa2c2c7e0df40ccad2b5993f0ec9f981dc395b7825288b6e516f406dbc3337dbfe6d23ed24829ca36196299e35adbc67c391320cf1ffa0702309902f1b4edd6e7b5bba04ec751c45eaaecfe1d81b200000000000000"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0xffff, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f00000002c0)) tkill(0x0, 0x34) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r3, r2, 0x0, 0x800006) setsockopt$inet_MCAST_LEAVE_GROUP(r4, 0x0, 0x2d, &(0x7f00000000c0)={0x0, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r5, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:28 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x9, 0xd19f}) add_key(&(0x7f0000000040)='blacklist\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f0000000280), 0x0, 0xfffffffffffffffe) r1 = openat$random(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/urandom\x00', 0x80000, 0x0) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000440)=0x4) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r2, &(0x7f0000000340)=[{0x0}], 0x1, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000480)="ab130005258bdaec910b9088d6fae452af105368887a0dd4f772856a2d3fa47087772d2967040ee7dca94a295e217dc30a56f499b3146845866256634e9d7f989bc80ae48a87b1268f11490c35fcec9968daf6b0b4186682852d1641b777743cefc868f8e0c22e93abab3b6bac205e183a932959d851c88c5ad9e299e1232020e8b7e8679247c70635ad06205741d9f33149fc00a06d29399956804a72098b15f3e496dbc6c648abe5d63275464d41416af0ddb61c20e1a417f285dbb42f9002597532ff673eadcaf69b55e346992e519bd43799738bb32174033131c1ac89f81f0b40", 0xe3) prctl$PR_SET_TIMERSLACK(0x1d, 0x3) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x24000000) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = getegid() setgroups(0x1, &(0x7f0000000200)=[r3]) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), &(0x7f0000000140)=0x4) r4 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/diskstats\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x4000000000010046) mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./bus\x00', 0x42) 20:33:28 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0xffffffffffffffff) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000180)=0xffffffff, 0x4) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x347082, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) r6 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r6, r5, &(0x7f0000007000/0x18000)=nil, 0x0, 0xffffffffffffffcc, 0x4, 0x0, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r6, 0xc0205648, &(0x7f00000000c0)={0x0, 0x8, 0x4, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0917, 0x0, [], @value64=0xfffffffffffffe00}}) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000038000040000000000000000000002004aa8aec1c1a42e47354eb1000000000e5ff0000000ad5cd6e00000000000000000000000000000711516ce5b20f88817d01e9a82d74af00"/107], 0x62) ioctl$TIOCGPKT(0xffffffffffffffff, 0x80045438, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) 20:33:28 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:28 executing program 0: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b03040000eda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce23568f2f7e56f0bf8893b5714959531400"/82], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) unlinkat(r1, &(0x7f0000000240)='./file1\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0xfffffffffffffe2d, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e}, 0x8, 0x6, 0xffff, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x0, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 1525.424482] QAT: Invalid ioctl 20:33:28 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xbb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x18040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000001}, 0x10905, 0x0, 0x0, 0x0, 0x800000000}, 0x0, 0xffffffffff7ffffb, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x3, 0xffffffffffffffff, 0x0) uname(0x0) perf_event_open(&(0x7f0000000440)={0x4, 0x70, 0xbb, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x100000001}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x10040}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x8000400) r0 = mq_open(&(0x7f0000000100)='-$\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) fadvise64(r0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x6, 0x0, 0x0, 0x41c2, 0x5a10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1c28, 0x3ff, 0x0, 0x800, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000140)={&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ff9000/0x7000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000004c0)}, 0x68) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r2 = syz_open_dev$vcsu(&(0x7f00000001c0)='/dev/vcsu#\x00', 0x4, 0x8400) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) r3 = getpid() tkill(r3, 0x9) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000000)=""/57) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa0434, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000005, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x9, 0x9}, 0x0, 0xffffffffffffffff, r1, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x4, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x81, 0x5}, 0x40442, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000002, 0x11, r5, 0x97a08000) sendto$inet(r4, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0xe00000000000000, 0x0, 0xffffffffffffffc2) [ 1525.480863] QAT: Invalid ioctl [ 1525.484679] QAT: Invalid ioctl [ 1525.494863] QAT: Invalid ioctl [ 1525.499429] QAT: Invalid ioctl [ 1525.516852] QAT: Invalid ioctl [ 1525.558649] QAT: Invalid ioctl [ 1525.580460] QAT: Invalid ioctl [ 1525.592287] QAT: Invalid ioctl [ 1525.610541] QAT: Invalid ioctl [ 1525.635003] QAT: Invalid ioctl [ 1525.650179] QAT: Invalid ioctl [ 1525.662947] QAT: Invalid ioctl [ 1525.673496] QAT: Invalid ioctl 20:33:28 executing program 3: socket(0x11, 0x800000003, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) openat$userio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/userio\x00', 0x0, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r1, r2, 0x0, 0x800009) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f00000002c0)) syz_open_procfs(r3, &(0x7f0000000040)='net/ipv6_route\x00') ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r2, 0x8983, &(0x7f0000000000)={0x7, 'wg0\x00', {0xdf}, 0x200}) clock_gettime(0x0, &(0x7f0000000080)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0) [ 1525.687185] QAT: Invalid ioctl [ 1525.701642] QAT: Invalid ioctl [ 1525.713286] QAT: Invalid ioctl [ 1525.735648] QAT: Invalid ioctl [ 1525.748363] QAT: Invalid ioctl [ 1525.761845] QAT: Invalid ioctl [ 1525.783051] QAT: Invalid ioctl 20:33:28 executing program 0: r0 = syz_open_procfs(0x0, 0x0) r1 = gettid() r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r1) write$binfmt_script(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000240)='cpuset+') close(r2) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000340)={0x1fd, 0x2, 0x1, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0xffff, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r3, r4, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r4, 0x0, 0x2d, &(0x7f00000000c0)={0x0, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r5, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) 20:33:28 executing program 5: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b03040000eda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce23568f2f7e56f0bf8893b5714959531400"/82], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) unlinkat(r1, &(0x7f0000000240)='./file1\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0xfffffffffffffe2d, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e}, 0x8, 0x6, 0xffff, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x0, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 1525.808584] QAT: Invalid ioctl [ 1525.840201] QAT: Invalid ioctl [ 1525.857413] QAT: Invalid ioctl [ 1525.876402] QAT: Invalid ioctl [ 1525.896970] QAT: Invalid ioctl [ 1525.938936] QAT: Invalid ioctl [ 1525.942522] QAT: Invalid ioctl [ 1525.964809] QAT: Invalid ioctl [ 1525.977548] QAT: Invalid ioctl 20:33:29 executing program 5: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b03040000eda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce23568f2f7e56f0bf8893b5714959531400"/82], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) unlinkat(r1, &(0x7f0000000240)='./file1\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0xfffffffffffffe2d, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e}, 0x8, 0x6, 0xffff, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x0, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 1525.990302] QAT: Invalid ioctl [ 1525.993905] QAT: Invalid ioctl 20:33:29 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) ioctl$KVM_IRQ_LINE(r3, 0x4008ae61, &(0x7f0000000040)={0x48, 0x1000}) 20:33:29 executing program 2: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b03040000eda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce23568f2f7e56f0bf8893b5714959531400"/82], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) unlinkat(r1, &(0x7f0000000240)='./file1\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0xfffffffffffffe2d, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e}, 0x8, 0x6, 0xffff, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x0, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:29 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') 20:33:29 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) sendmsg$AUDIT_GET(r1, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x10, 0x3e8, 0x200, 0x70bd25, 0x25dfdbfc, "", ["", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x8821}, 0x840) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) r4 = socket$kcm(0x10, 0x2, 0x10) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)={0x18, r5, 0x1, 0x0, 0x0, {0xa}, [@IPVS_CMD_ATTR_DAEMON={0x4}]}, 0x18}}, 0x0) sendmsg$IPVS_CMD_DEL_DEST(r3, &(0x7f0000000440)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x64, r5, 0x10, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_vlan\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x10000}, @IPVS_CMD_ATTR_SERVICE={0x10, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x0, 0x2f}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3d}]}, 0x64}, 0x1, 0x0, 0x0, 0x80}, 0x24008101) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r6, r7, 0x0, 0x800009) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={r9, @in6={{0xa, 0x0, 0x0, @private1}}}, &(0x7f0000000000)=0x84) setsockopt$inet_sctp6_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f0000000400)=@assoc_value={r9, 0x1}, 0x8) getsockopt$inet6_udp_int(r7, 0x11, 0x1, &(0x7f0000000340), &(0x7f0000000380)=0x4) 20:33:30 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) prctl$PR_SVE_GET_VL(0x33, 0xc834) 20:33:31 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:31 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) 20:33:31 executing program 3: socket(0x11, 0x800000003, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) openat$userio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/userio\x00', 0x0, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r1, r2, 0x0, 0x800009) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f00000002c0)) syz_open_procfs(r3, &(0x7f0000000040)='net/ipv6_route\x00') ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r2, 0x8983, &(0x7f0000000000)={0x7, 'wg0\x00', {0xdf}, 0x200}) clock_gettime(0x0, &(0x7f0000000080)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0) 20:33:31 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1, 0x80, 0x0, 0x7, 0x0, 0x5, 0x40000, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4000, 0x4, @perf_config_ext={0x101, 0x80}, 0x1, 0x917f, 0xffffff7f, 0x4, 0x101, 0x7, 0x81}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) 20:33:32 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={r2, @in6={{0xa, 0x0, 0x0, @private1}}}, &(0x7f0000000000)=0x84) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x40000, 0x0) r3 = socket$inet6(0xa, 0x1, 0xd59) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000080)={r2, 0x7}, 0x8) 20:33:32 executing program 0: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0xffff, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x0, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000240)={0x8, [0x7, 0x839f, 0x200, 0x5, 0x9, 0x8, 0x7, 0x9]}, &(0x7f0000000340)=0x14) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:32 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x81002, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r2, 0xc0505510, &(0x7f0000000280)={0x4, 0x8, 0x7fffffff, 0x7fffffff, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {}, {}, {}]}) 20:33:32 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000180)=ANY=[@ANYBLOB="bbbbbbbbbbbb00000000000086dd6020920000443c00fe8000000000000000000000000000bbff02000000000000000000000000000100040000000000000502000000010000afe2dde2537b172d9d7fcced87d8cc01871862d267c47d72251e0000000040000000000000000100"/121, @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000007d8c9cd769a2db1c7fd137d77b642dba0a7c2816b4e0fe066aa69a8c874f3b9cba39c3517e2dc05392f29b749ffaf14a5d764ee71e5f6106711a0000000000000000fb"], 0x0) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x20100, 0x0) syncfs(r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') r3 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x9, 0x301004) ioctl$PPPIOCGL2TPSTATS(r3, 0x80487436, &(0x7f0000000080)="c63d2c8c244e2001f166bed278e36ad294b822dbd5f5") sendfile(r1, r2, 0x0, 0x800009) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4) 20:33:32 executing program 2: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000200)=ANY=[], 0x1f) r1 = creat(&(0x7f0000000300)='./bus\x00', 0x0) write$FUSE_STATFS(r1, &(0x7f0000000140)={0x60, 0x0, 0x0, {{0x0, 0x20000}}}, 0x60) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0)=0xfffffffffffffffc, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket(0x2, 0x803, 0xff) connect$inet(r5, &(0x7f0000000200)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) r6 = dup(r5) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r7, r8, 0x0, 0x800009) connect$phonet_pipe(r8, &(0x7f0000000040)={0x23, 0x4f, 0x0, 0x1f}, 0x10) r9 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r6, r9, 0x0, 0x8000fffffffe) creat(&(0x7f0000000100)='./bus\x00', 0x0) 20:33:32 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000040)=@sack_info={0x0, 0x5, 0x2}, &(0x7f0000000080)=0xc) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000000c0)={r2, 0x7ff}, 0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r3, r4, 0x0, 0x800009) sendmsg$NFNL_MSG_CTHELPER_GET(r4, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x881}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x4c, 0x1, 0x9, 0x5, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0x4}, @NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x7ff}}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x4c}, 0x1, 0x0, 0x0, 0x1}, 0x24044824) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r5, r6, 0x0, 0x800009) 20:33:32 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x600040, 0x0) ioctl$SIOCAX25OPTRT(r0, 0x89e7, &(0x7f00000000c0)={@default, @bcast, 0x2, 0x20}) r1 = syz_open_dev$dri(0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(0x0, 0x10, 0x0) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='trusted.overlay.opaque\x00') getsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioprio_get$uid(0x3, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000180)) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) mlockall(0x1) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) 20:33:32 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) [ 1529.691187] audit: type=1804 audit(5885210012.823:201): pid=28230 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir510076224/syzkaller.vnMEgn/1073/bus" dev="sda1" ino=17907 res=1 [ 1529.833506] audit: type=1804 audit(5885210012.913:202): pid=28235 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir510076224/syzkaller.vnMEgn/1073/bus" dev="sda1" ino=17907 res=1 [ 1529.990057] audit: type=1804 audit(5885210012.933:203): pid=28230 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir510076224/syzkaller.vnMEgn/1073/bus" dev="sda1" ino=17907 res=1 20:33:34 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x151042, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/tty/drivers\x00', 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r4, r5, 0x0, 0x800009) ioctl$SNDCTL_DSP_SETDUPLEX(r5, 0x5016, 0x0) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r3, r6, 0x0, 0x800009) ioctl$KVM_GET_API_VERSION(r6, 0xae00, 0x0) sendfile(r1, r2, 0x0, 0x4000000000010046) ioctl$SNDRV_PCM_IOCTL_WRITEN_FRAMES(r1, 0x40184152, &(0x7f00000002c0)={0x0, &(0x7f0000000280)=[&(0x7f0000000600)="dd1f4afbd7b638c0984e2e017f7153e0d9a72fe154d0eec782ae774466e1f353d2d8540657b72c607b62041e7ce12846507f03c619f98c5f474fbeddd74f5a6c1a31c92d5d1b448e9f3f6f7f1221a1fcc3131eaa68217b07971b2b68a3e19f59967377d8392d8ed52ba55b382ec0c249b38a2f8211dbebb5d5ffc6694ed92cb686778df53c6a9c4c2ed4ebf793a3c8bbc70ebee749905d1ee1e17858a2dca45c415a2ca9543868cb9f9cabe856d8cdc0e7e95276b82bdae8fc82c3c6ff0411b1c52e3ba0d86c9e28c4f76b647e711227c58828c2bea3d6a826d2c7b57d91c5d055200ebd7ddeb9c7d7b4b9854391a5114bcb012cd85a68ac", &(0x7f0000000800)="40cd3d202ad4d058241cbb7999c98548f5bb762b762ffd2dd1e9aa6ef734cb36924c0d8726c7e1bfe81d3c3331bab50e3a2b1efaa8b82b2f4e289254954949d702063318cebe340716efcb37a5aefbf5e445e1b247c577f3ecf46a443b1c8d4a12430eb7994d2377818ac48993555c27fc140d3c9758404a429a467ba2f2a181e40d7ff8594f278ca3cf459d28e509c2240352699a2a69e0fa9a3615efff958aeae6fc34594621", &(0x7f00000009c0)="b97bd3c3a18d8434cb328acfc34accbcc7ae3b1c8110f56453466021bfd366aa4113f31a769206b91ecabec7b3d0116127fd293d440d03abaa1d925f578991f77574777d03fa28f527dd0f06343d1241f9f6731ba04b9c9b2c5e86d5579ab9b407981311c81e93a89ce3a93eadde5ab25e72a7cb0f678969253ceb5d80cdf37cc71ef54e28", &(0x7f0000000a80)="5364165f6670056ea9e967831808da60a81d27d57ccd5b23e266006b985c1fa7bb8aca64054423cbc25cc8809f60bdb8f5da8f661073caa22c2bdc8a4a8ec98397ee91417c05cc51798b0c41cda08dde08600f6fac46a1f9c6a7f605f7bffec536c548d953eda59c5ba4e578a3e699745dbe83cbf3973d16dfc5b42e6e149c0c87f9f76c64cbc1", &(0x7f0000000b40)="13efef093166d325c8fd479b83fa4b9cdae177ba3eb6269df9ea5042e44196f7e8f2e0dfe0dfe6d4503554a90d7cfd732cfe293ca1a77365e5a11e3fd32254935659f65c9d059a831f6a32de914aaac5950fc789a17469ed466f28ce52e48fef9495d48e1d98ba4ea8d8794eb7c75187369f3674e6fa7c4d017385438c97536f45c715dd1f1d4d24ba366d24ede42770c11b3c9e4c6b06b969f3d6a9a5b68b8ed56d12d82a5cc7e55e9bbd2960de445c254ec9951b33e36b0a8c94e15d751024", &(0x7f0000000c00)="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"], 0xffffffffffffffff}) 20:33:35 executing program 3: socket(0x11, 0x800000003, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) openat$userio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/userio\x00', 0x0, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r1, r2, 0x0, 0x800009) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f00000002c0)) syz_open_procfs(r3, &(0x7f0000000040)='net/ipv6_route\x00') ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r2, 0x8983, &(0x7f0000000000)={0x7, 'wg0\x00', {0xdf}, 0x200}) clock_gettime(0x0, &(0x7f0000000080)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0) 20:33:35 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net\x00') sendfile(r1, r2, 0x0, 0x800009) r3 = fcntl$getown(r2, 0x9) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000100)={0x51491eb5, 0x1, 0x4, 0x0, 0x7f, {}, {0x3, 0x2, 0x9, 0x6, 0x0, 0x40, "f18abc66"}, 0x82, 0x1, @offset, 0x177, 0x0, r2}) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x1, 0x8, 0x1f, 0x5, 0x0, 0xfffffffffffffffa, 0x6018, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x40, 0x0, @perf_config_ext={0x0, 0x7}, 0x40, 0x0, 0x4a, 0xb, 0x1, 0x1, 0x5}, r3, 0x0, r4, 0x9) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r5, 0x0, 0x800009) 20:33:35 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x43, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) clock_gettime(0x0, &(0x7f0000002d00)={0x0, 0x0}) recvmmsg(r2, &(0x7f0000002c40)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000001c0)=""/153, 0x99}], 0x1}, 0x2a}, {{&(0x7f00000003c0)=@alg, 0x80, &(0x7f0000002800)=[{&(0x7f0000000440)=""/192, 0xc0}, {&(0x7f0000000500)=""/125, 0x7d}, {&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000001580)=""/74, 0x4a}, {&(0x7f0000001600)=""/237, 0xed}, {&(0x7f0000001700)=""/4096, 0x1000}, {&(0x7f0000000280)}, {&(0x7f0000002700)=""/25, 0x19}, {&(0x7f0000002740)=""/178, 0xb2}], 0x9, &(0x7f00000028c0)=""/15, 0xf}, 0x10001}, {{&(0x7f0000002900)=@un=@abs, 0x80, &(0x7f0000002b40)=[{&(0x7f0000002980)=""/75, 0x4b}, {&(0x7f0000002a00)}, {&(0x7f0000002a40)=""/249, 0xf9}], 0x3, &(0x7f0000002b80)=""/132, 0x84}, 0xffffffff}], 0x3, 0x40000040, &(0x7f0000002d40)={r3, r4+10000000}) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fffffc, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="584653420000100000000000000010000000000000000000000000000000000034fb8fb9e4bf48b6ad26c597eb4f5c1900000000000000040000000000000d880000000040000d890000000000000d8a000000010000100000000001000000000000035ab424020004000004000000000000000000ec00000c090a020c", 0x7d}], 0x0, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x101800, 0x0) unshare(0x0) 20:33:35 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x43, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r1 = socket$inet6(0x10, 0x108000000003, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="5500000019007faf37c0f2b2a4a280930a60011000a843dc90052369390009002f000000000000001900050000000000000000000004d54400000084136ef75afb83de448daa7227c4bf21a85900d1db8e7b49aafb", 0x55}], 0x1}, 0x0) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r1, 0x29, 0x37, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1d8) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) ioctl$SNDRV_PCM_IOCTL_HWSYNC(r3, 0x4122, 0x0) socket$netlink(0x10, 0x3, 0x0) 20:33:35 executing program 0: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0xffff, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x0, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:35 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:35 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000040)={0x4, 0x70, 0xff, 0x1f, 0x19, 0xff, 0x0, 0x3, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, @perf_config_ext={0x7fffffff, 0x78cc}, 0x2208, 0x7, 0x5, 0x5, 0x1, 0x3, 0x8}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="8244d457e5a8200000000405000000000000000000fbe4c55d1d006d1351559349c5e7f0ff"], 0x20}, 0x1, 0x0, 0x0, 0x90}, 0x4801) 20:33:35 executing program 5: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0xffff, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x0, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000240)={0x8, [0x7, 0x839f, 0x200, 0x5, 0x9, 0x8, 0x7, 0x9]}, &(0x7f0000000340)=0x14) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:35 executing program 5: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0xffff, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x0, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000240)={0x8, [0x7, 0x839f, 0x200, 0x5, 0x9, 0x8, 0x7, 0x9]}, &(0x7f0000000340)=0x14) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:35 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x20}}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') setsockopt$SO_TIMESTAMP(r1, 0x1, 0x1d, &(0x7f0000000140)=0xffffff01, 0x4) sendfile(r1, r2, 0x0, 0x800009) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r3, r4, 0x0, 0x800009) setsockopt$CAIFSO_REQ_PARAM(r4, 0x116, 0x80, &(0x7f0000000040)="7a23c7d482ecc1ab4e5467d1c8c52e215508b4478cd5f8800c0ec1513484cac1de84cfcad446ce9463fc3fe2f7642f24eeede2b1de20c0a52035e56eab84d68f695ac347de0727ed580fc27ada9e7bd3680c6e6167bb5e4c92c1128cfe5f7bbd71dcd3c5fb3608a0169da2e3749ed887055e987349be3c03568019817d562a843e0c855619cee57566dcf8d83ad6a76d7d23ff71860a4db6c49427068eb728cccabc59b058739c8691bfb3297a06f19f44ff46beb9e5b81360a0efe27edbec1f856a6ecfe246ec184f65627680e65e1d61d0eaf000abf5053dcd239304394548a2f4", 0xe2) 20:33:36 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) socket$inet6(0xa, 0x8000008000080003, 0x5) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x20000, 0x0) connect$vsock_stream(r0, &(0x7f0000000100)={0x28, 0x0, 0xffffffff, @local}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) r2 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'erspan0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2c0000001300358600000003000100000731c60e00e9e321bbaaf282274c782ba3715acb00fba86a915a003e47aa48364b435d5e7cdb659362000010a8b33b1a16525bfddd187a9f0da73fb394b7d465b212fb6aaee1b9f9105f17af1c647c7ab44339f04cf4c988b958dcd702c73963c027dca46bbaa38f9679d0c9a04cf15db5079d8dcfae2b6abf63fbacaa8349816dd96c1900342d158310d2b1514cdc118557", @ANYRES32=r3, @ANYBLOB="01ffffef080008010c001a0008000200000001"], 0x2c}}, 0x0) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000140), 0x2, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_REVISION_TARGET(r5, 0x0, 0x43, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r6, r7, 0x0, 0x800009) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x20, &(0x7f0000000180)={@ipv4={[], [], @loopback}, 0x8001, 0x0, 0xff, 0xa, 0xfe21, 0x4}, 0x20) fcntl$setlease(r5, 0x400, 0xe28bc71de753e5a1) 20:33:38 executing program 1: write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="29000000b815be1100000000000000000600"/31], 0x29) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_audit(0x10, 0x3, 0x9) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) readv(0xffffffffffffffff, &(0x7f0000001780)=[{&(0x7f0000000180)=""/83, 0x53}, {&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000000200)=""/175, 0xaf}, {&(0x7f0000001300)=""/119, 0x77}, {&(0x7f0000001380)=""/177, 0xb1}, {&(0x7f0000001840)=""/185, 0xb9}, {&(0x7f0000001500)=""/200, 0xc8}, {&(0x7f0000001600)=""/80, 0x50}, {&(0x7f0000001680)=""/132, 0x84}, {&(0x7f0000001740)=""/53, 0x35}], 0xa) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r1, r2, 0x0, 0x800009) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f00000002c0)) sendmsg$AUDIT_SET(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x34, 0x3e9, 0x400, 0x70bd27, 0x25dfdbff, {0x14, 0x0, 0x0, r3, 0x1, 0xffff, 0x1ff, 0x0, 0x9}, ["", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x4c004}, 0x20000000) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r4, 0x0, 0x800009) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r5, r6, 0x0, 0x800009) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000004, 0x2010, r6, 0x8918e000) 20:33:38 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x67, 0x400) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x4a2103, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x43, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) r6 = syz_open_procfs(0x0, &(0x7f0000000200)='oom_score_adj\x00') sendfile(r5, r6, 0x0, 0x800009) setsockopt$SO_TIMESTAMP(r5, 0x1, 0x40, &(0x7f00000001c0)=0x6e49497f, 0x4) r7 = dup2(r0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$kcm(0x10, 0x2, 0x10) r9 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r8, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYRES64, @ANYRES16=r9, @ANYRES16=r7], 0x68}}, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r7, 0x541b, &(0x7f0000000180)) 20:33:38 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:38 executing program 0: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b03040000a704000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713324577124d1a2e21da765cd1ce2356a8f87e56f0bf8893d8974959d3149d5fea5a811eb3846aee74e87decd70886c74991dde66c6048b3d4116135d5947736fdaf7da3b70bea3760dc70e0b65056d0b94a64e59b98ba3a1b968ea44c8ed0a6423443d7fb9ccdb38ddaadf62a40362f34b5be4a6ec472af1e3cac089d868ec692b730f4950a205d6defc7987146"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0xffff, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x800009) ioctl$KVM_GET_EMULATED_CPUID(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000340)=""/143) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f00000000c0)={0x0, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x100800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x100000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET(r1, 0x0, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x5b30c0, 0x0) accept4$unix(r2, &(0x7f0000000300)=@abs, &(0x7f00000003c0)=0xffffff50, 0x80800) ioctl$TIOCGICOUNT(r2, 0x545d, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x138, &(0x7f0000000340)="c4fe910c6786cec96ddb5322b89152563fadcd891969b71832cb470c94d61f3514dca76fd1664d2013712c225da4a455f4c9fd98a5680956f1291607e39a209852cea9c3f5ec31a933137a89acd693be5df4e7a840effc012904b9ce36371060422e2cc232d5863cad44f8be41bcd8922896ba19b709aa38f427f642337a05000000000000008058f48b81186dae5faab1f224411f52645b160ee702000000fe8b2a63f171629b6175686f0a0a28485b243f2fdd70cbff272dfc4b5dabb38aa6084e1620f050de9f633025dba5736a236669f74fd4b63e5081aa80b9d53b8e5edf1398fca76d7b821c4d1f75c380fc86d958c23e4bb27f580a902e173675c3f5e5b5e58903cd2adb79207b96d1b3bc00b797136b568ae9aa9b5b3ace00911f866fbf2dc2ab79d0508a685fcf8e6a8da0072229d753373fd7"}}], 0x1c) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000480)="c0d10ce6fba97b2d3f5c87967b8e2bb4b0dae7026a4014afd42798ab804aba3789cdf1031f47c75005d1d47b8b22ebb87ba5522e2620b9630c49524d1131b74592e7e10ccbe6dbe9923278729db9053808487417bc45043a419c0b776b1c62310331c16fb07f72216161306c1766a22a6314ef62c74eec6b262a8e74bfa44f1636ab1605d65f0608b4171950152e63050b57f5416065c74b3ecbc40d938c61cb3dad464111061204d500ec6bb35edceef85d62db5507714e4841571d70b6a729d2308365a008772118c4ff711f27559ae596c407f0baddc95a04ffae535bfa5225f6ce336fb0b6817fdc89474d55deb7c301aff618e34c0064ce09f9a267a1e752d85e2a26acbe29d29f8e4e803318ebfbc8ad652569073cfd103a710cc4424bf3ff3201b03eea99d18bb0c8527b111f024130f51d5d6583e64078ac071e58dfb42f7f465e28737e5ac39e90d4c42e3b0000", 0x152}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x33) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000380)) process_vm_readv(0x0, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) 20:33:38 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:38 executing program 5: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r1, &(0x7f0000000a40), 0x8000000000000b0, 0x101d0) r2 = dup(0xffffffffffffffff) ioctl$sock_proto_private(r2, 0x89e1, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip6_mr_vif\x00') ioctl$SIOCPNDELRESOURCE(r3, 0x89ef, &(0x7f00000000c0)=0x2a) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x44002, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip6_mr_vif\x00') preadv(r4, &(0x7f0000000100)=[{&(0x7f0000000640)=""/4093, 0xffd}], 0x1, 0x2) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000040)='vegas\x00', 0x6) [ 1535.694449] hub 9-0:1.0: USB hub found [ 1535.704091] hub 9-0:1.0: 8 ports detected 20:33:38 executing program 2: syz_emit_ethernet(0x188, &(0x7f0000000140)={@local, @dev, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, '\x00', 0x152, 0x2b, 0x0, @local, @local, {[@hopopts={0x73}], {0x4e20, 0x0, 0x14a, 0x0, @gue={{0x1, 0x0, 0x0, 0x81, 0x100, @void}, "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"}}}}}}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) ioctl$VT_WAITACTIVE(r1, 0x5607) 20:33:39 executing program 0: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="232120967fcb076c653020f0451559d313411c9614494846ef90b7deaa0000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f869595314"], 0x9d) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0xffff, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x1) r3 = accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x80000) kcmp(0x0, 0x0, 0x5, r2, r3) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r4, r5, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r5, 0x0, 0x2d, &(0x7f00000000c0)={0x0, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r6, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:39 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:39 executing program 2: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b03040000a704000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713324577124d1a2e21da765cd1ce2356a8f87e56f0bf8893d8974959d3149d5fea5a811eb3846aee74e87decd70886c74991dde66c6048b3d4116135d5947736fdaf7da3b70bea3760dc70e0b65056d0b94a64e59b98ba3a1b968ea44c8ed0a6423443d7fb9ccdb38ddaadf62a40362f34b5be4a6ec472af1e3cac089d868ec692b730f4950a205d6defc7987146"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0xffff, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x800009) ioctl$KVM_GET_EMULATED_CPUID(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000340)=""/143) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f00000000c0)={0x0, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x100800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:39 executing program 5: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x1020014, &(0x7f00000001c0)=ANY=[@ANYBLOB="6c6f7765726469723d2e2f6275732c776f726b6469723d2e2f66696c65312c7570706572646972d1b966601f148971b8eef530fa3d2e2f66696c65309dc23dbb5c642be1f3bb3d77adf846ea54ecb04eee20d006fbdf"]) chdir(&(0x7f00000002c0)='./bus\x00') r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)=0xfdfdffff) 20:33:40 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1d}}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) sendmsg$kcm(r3, &(0x7f0000000600)={&(0x7f0000000040)=@vsock={0x28, 0x0, 0x2710, @my=0x1}, 0x80, &(0x7f0000000480)=[{&(0x7f00000000c0)="d66de76f73ffaf460e4810d07d1dabfaa6627678ffaa82d7352517b00ef51530de825440fd8a2c1a659f052c3e0657a2b60b920183001072c08eff38085f7c6a6b62d336d39e6a1fe9b63684e46975e7ab4f4c8765a742188586f0f7605524079c01459cf3176fb3864eca5dff318a693f077bb7eb9fdcf73cfe754f65542548ed168c62943fd1cb81dac5647afbce44e5d89e8217becb4f1b9bf93150de36a0e08c86736fa5a71dcd943d5104ed12aa865236b0429e116ba9ae638140918508429083b2d08772f7a868", 0xca}, {&(0x7f00000001c0)="914e87842c4e878f580fd956ff967f71294fbfae64e0f0e83c95a8fdba0d867b2c3558c4e9bbc6e98d27138e3de8f94db78dc8215d7389c8a776746defdf818cc7828c00", 0x44}, {&(0x7f0000000240)="5f668bb959959d2224385e727b14645df571b4ad3ae85d9d320cc33f4f64c21fb3a60e080501f53bb0795526780d39b7bcae023cabb6b32714fe59257f6e9f53619ebe8f12c36d22661dac8a2792fe69a549bd6cfced", 0x9b}, {&(0x7f00000002c0)}, {&(0x7f0000000300)="68e5", 0x2}, {&(0x7f0000000640)="98838b76089ce3cc12fa1fc010c155b64080bd1fef75d01b308978dd1046c3fd1405d62eab227744071489981b6f331c9c614421118207c5f1e401a22ac2f84b0cd64e3f5749e917e62306016020361658e35c09a7b56b50dc8c7644a0db6970f63de9b7ec6f0178375f10", 0x6b}, {&(0x7f00000003c0)="4b929044634ef50ecff4a3eb09d6832aec2df26f5144a954d7d918d2bf99c9293e3e384851252b6fd5a17aa9dbf6ba83200ed7cd8b81e9260b3b060efc3fb103fa023910fc0f214ebe7ada440cc0ec98fba385ec32e4a3471c4dde7de4af8988590cbb360d1b6f7b3fbd40483f524c3d7c43532e50ace5a9fad800c82f9266dd135310e5ccd72393ea40111853ec9e0bfe142820f392139daad8187bb485bd25541398b2e82a7b34daea23b4b02b521145d927b3404b1e287d30989af5dbb0", 0xbf}], 0x57, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x100}, 0x8000) sendfile(r0, r1, 0x0, 0x800009) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r4, r5, 0x0, 0x800009) ioctl$SNDRV_CTL_IOCTL_PVERSION(r5, 0x80045500, &(0x7f00000002c0)) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_NODELAY(r5, 0x84, 0x3, &(0x7f0000000340)=0xfff, 0x4) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) 20:33:40 executing program 0: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0xcf) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0xffff, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x0, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:40 executing program 2: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b03040000a704000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713324577124d1a2e21da765cd1ce2356a8f87e56f0bf8893d8974959d3149d5fea5a811eb3846aee74e87decd70886c74991dde66c6048b3d4116135d5947736fdaf7da3b70bea3760dc70e0b65056d0b94a64e59b98ba3a1b968ea44c8ed0a6423443d7fb9ccdb38ddaadf62a40362f34b5be4a6ec472af1e3cac089d868ec692b730f4950a205d6defc7987146"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0xffff, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x800009) ioctl$KVM_GET_EMULATED_CPUID(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000340)=""/143) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f00000000c0)={0x0, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x100800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:40 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f000000b180)=[{{0x0, 0x0, &(0x7f0000002e00)=[{&(0x7f00000002c0)=""/163, 0xa3}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x1b, &(0x7f0000000040)={@dev}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000140)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') socket$inet_udplite(0x2, 0x2, 0x88) write$eventfd(0xffffffffffffffff, 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, 0x0) syz_open_pts(r3, 0x0) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYBLOB]) ptrace$setregset(0x4205, 0x0, 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r4, r5, 0x0, 0x800009) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000000000)={0x1ff, 0x0, 0x1, 0x1000, &(0x7f0000fff000/0x1000)=nil}) preadv(r2, &(0x7f00000017c0), 0x1d0, 0x0) 20:33:41 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x42402, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000080)={{0x7f, 0x45, 0x4c, 0x46, 0x1f, 0x0, 0x1, 0x1, 0x7, 0x2, 0x6, 0x997c, 0x330, 0x38, 0x30c, 0x6, 0x0, 0x20, 0x1, 0x5, 0x7, 0x40}, [{0x3, 0x7f, 0x0, 0x1, 0xb8, 0x2, 0x3ff, 0xa6}], "7f391b93a657df6e8f0abbf7db799b41760c4eadcdf049b64ff18aa2804df7cae401cdf3d94fae5a5878ef2f3ab17194384f9dc79a49e638d7bc227ed687eb3f29524a7d2721b5fc7360832d4396acd160576c515e1ba1857b6298a75096b0d0ba65d5d128eec455677182ec500134", [[], [], [], [], [], []]}, 0x6c7) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x408082, 0x0) syz_open_pts(r3, 0x200000) sendfile(r1, r2, 0x0, 0x800009) 20:33:41 executing program 2: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b03040000a704000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713324577124d1a2e21da765cd1ce2356a8f87e56f0bf8893d8974959d3149d5fea5a811eb3846aee74e87decd70886c74991dde66c6048b3d4116135d5947736fdaf7da3b70bea3760dc70e0b65056d0b94a64e59b98ba3a1b968ea44c8ed0a6423443d7fb9ccdb38ddaadf62a40362f34b5be4a6ec472af1e3cac089d868ec692b730f4950a205d6defc7987146"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0xffff, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x800009) ioctl$KVM_GET_EMULATED_CPUID(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000340)=""/143) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f00000000c0)={0x0, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x100800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:41 executing program 5: socket$packet(0x11, 0x0, 0x300) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x13401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @loopback}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(r2, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) fcntl$getownex(r0, 0x10, &(0x7f00000001c0)) connect$inet(r2, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000000c0)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_LISTALL(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000100000000000000000300000006000b0000000000080004000300000006000b002200000008000c000000000014000500fe8800000000000000000000000000017009f54a7cf92092ae6e92ec62130b9ac7a6689ffe8c05c045d84848bc8d9e2ec5b0981777ca83878680639f0197f85663e3ce792c53feb284a35b28b9108262d39bea4cf2f19ef75e6315763c8856263b95ff1f3a427808f99c7834411f4d980bea73593d1a732d1162cd2642fb9b7838d529a7d091aaa5da8ed50a7b9f8316e0cfd1"], 0x48}}, 0x0) sendmsg$NLBL_MGMT_C_LISTALL(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x14, r3, 0x400, 0x70bd2a}, 0x14}, 0x1, 0x0, 0x0, 0x20000080}, 0x4048000) sendmsg$NLBL_MGMT_C_ADDDEF(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x70, r3, 0x1, 0x70bd27, 0x25dfdbfb, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @dev={0xac, 0x14, 0x14, 0xe}}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x1}, @NLBL_MGMT_A_CV4DOI={0x8}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @rand_addr=0x64010100}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0xfffffffffffffffd}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @empty}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x7}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @dev={0xfe, 0x80, [], 0x36}}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @private=0xa010101}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @remote}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000000}, 0x10000010) r4 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r4, &(0x7f00000000c0)={0x2, 0x4e21, @multicast2}, 0x10) connect$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x2f) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e21, @empty}, 0x10) r5 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x800) flock(0xffffffffffffffff, 0x1) 20:33:41 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:42 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:42 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r1, r2, 0x0, 0x800009) r3 = ioctl$TIOCGPTPEER(r2, 0x5441, 0x0) ioctl$GIO_FONTX(r3, 0x4b6b, &(0x7f0000000440)={0x3, 0x16, &(0x7f0000000040)}) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r4, 0x0, 0x800009) 20:33:42 executing program 5: socket$packet(0x11, 0x0, 0x300) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x13401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @loopback}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(r2, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) fcntl$getownex(r0, 0x10, &(0x7f00000001c0)) connect$inet(r2, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000000c0)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_LISTALL(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000100000000000000000300000006000b0000000000080004000300000006000b002200000008000c000000000014000500fe8800000000000000000000000000017009f54a7cf92092ae6e92ec62130b9ac7a6689ffe8c05c045d84848bc8d9e2ec5b0981777ca83878680639f0197f85663e3ce792c53feb284a35b28b9108262d39bea4cf2f19ef75e6315763c8856263b95ff1f3a427808f99c7834411f4d980bea73593d1a732d1162cd2642fb9b7838d529a7d091aaa5da8ed50a7b9f8316e0cfd1"], 0x48}}, 0x0) sendmsg$NLBL_MGMT_C_LISTALL(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x14, r3, 0x400, 0x70bd2a}, 0x14}, 0x1, 0x0, 0x0, 0x20000080}, 0x4048000) sendmsg$NLBL_MGMT_C_ADDDEF(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x70, r3, 0x1, 0x70bd27, 0x25dfdbfb, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @dev={0xac, 0x14, 0x14, 0xe}}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x1}, @NLBL_MGMT_A_CV4DOI={0x8}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @rand_addr=0x64010100}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0xfffffffffffffffd}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @empty}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x7}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @dev={0xfe, 0x80, [], 0x36}}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @private=0xa010101}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @remote}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000000}, 0x10000010) r4 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r4, &(0x7f00000000c0)={0x2, 0x4e21, @multicast2}, 0x10) connect$inet(r4, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x2f) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e21, @empty}, 0x10) r5 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x800) flock(0xffffffffffffffff, 0x1) 20:33:42 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:43 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:43 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x40040, 0x0) ioctl$KVM_SET_SIGNAL_MASK(r1, 0x4004ae8b, &(0x7f0000000080)={0x90, "9df2dfc2d45dd778d72d28f981e79dbd16c5e93b7edeb606f9e59ad862c7541c75d736ce3e90d96120cdfd90542e86a24747f2e6114482236d94d97ae327657e5af19d0743172b7eb48aabe530d21664936b6ef1c059c84118b546419a54ec91a5adb9c1b2a09600c950994eba439b2f06e1e1038e14b3db6e768415625e7e62126ebdb1c5f7c58217c70ed316ddbc4a"}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r2, 0x0, 0x800009) 20:33:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0xc, 0x0, 0xffffffff, 0x6}) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000380)) setsockopt$inet_sctp_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, 0x0, 0x0) process_vm_readv(0x0, &(0x7f0000000380)=[{0x0}], 0x1, &(0x7f0000002540), 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) creat(0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) shmctl$IPC_RMID(0x0, 0x0) shmctl$SHM_STAT(0x0, 0xd, &(0x7f00000003c0)=""/4096) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x40, 0x0, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_DQEVENT(r1, 0x80885659, &(0x7f0000000080)={0x0, @ctrl}) syz_genetlink_get_family_id$smc(0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$EVIOCGBITSW(r2, 0x80404525, &(0x7f00000001c0)=""/215) 20:33:43 executing program 5: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x49f) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001180)={0x14, r2, 0x917, 0x0, 0x0, {0x5}}, 0x14}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000900)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100400}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r2, 0x300, 0x70bd2a, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0xfc0}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40a0}, 0x5f58fa430f167b) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f0000000940)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r5, r6, 0x0, 0x800009) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001180)={0x14, r8, 0x917, 0x0, 0x0, {0x5}}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r6, &(0x7f0000000f80)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000f40)={&(0x7f00000009c0)={0x5c, r8, 0x300, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @mcast1}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3f}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x2e}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x40000) close(r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', &(0x7f0000000880)=[&(0x7f0000000a40)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[xS\rO\x880\xf1P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac%~\x12\x7ft\xa9\v\xae\x9c\xf3\xb0\xb9\t\x8d\xb9p\xcb\xe3csR\xe2\xfbL\x9f\xb3\xa4^\xc1\xf7m0\xa8\xfd\xcf\xfdY\\d\x03(\x89\xe7\xe1\xcf\xa4m3SQc\xbaG\xcd\xce\xf5o@\xfdi\xd1w~\xc8\xb9\\\a\xeba\x18\x95\x94\xea\xd4\xe8\xcaP\x89\x9b\x12\xa7\xdb\x95c=\x16\xd5\x06\xf9O\x87\x02\xcd\xa4\xc0\xa17\x92]_\xa2>\xbb\xc8?\x98\xa6+\xcf^\xa0\xe8\x9a\x9e>O\xbf\xd3Fd\xfe\x9c|0\xdd\x7f\x85^\xdf\xe0\x84\x17\xe5\xc05\x8av\xc4\x00', &(0x7f0000000cc0)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[xS\rO\x880\xf1P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac%~\x12\x7ft\xa9\v\xae\x9c\xf3\xb0\xb9\t\x8d\xb9p\xcb\xe3csR\xe2\xfbL\x9f\xb3\xa4^\xc1\xf7m0\xa8\xfd\xcf\xfdY\\d\x03(\x89\xe7\xe1\xcf\xa4m3SQc\xbaG\xcd\xce\xf5o@\xfdi\xd1w~\xc8\xb9\\\a\xeba\x18\x95\x94\xea\xd4\xe8\xcaP\x89\x9b\x12\xa7\xdb\x95c=\x16\xd5\x06\xf9O\x87\x02\xcd\xa4\xc0\xa17\x92]_\xa2>\xbb\xc8?\x98\xa6+\xcf^\xa0\xe8\x9a\x9e>O\xbf\xd3Fd\xfe\x9c|0\xdd\x7f\x85^\xdf\xe0\x84\x17\xe5\xc05\x8av\xc4\x00'/595, &(0x7f00000002c0)='#selinvmnet0vboxnet1\x00\x00\x00\x00', &(0x7f0000000340)='${\x00', &(0x7f0000001440)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[xS\rO\x880\xf1P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac%~\x12\x7ft\xa9\v\xae\x9c\xf3\xb0\xb9\t\x8d\xb9p\xcb\xe3csR\xe2\xfbL\x9f\xb3\xa4^\xc1\xf7m0\xa8\xfd\xcf\xfdY\\d\x03(\x89\xe7\xe1\xcf\xa4m3SQc\xbaG\xcd\xce\xf5o@\xfdi\xd1w~\xc8\xb9\\\a\xeba\x18\x95\x94\xea\xd4\xe8\xcaP\x89\x9b\x12\xa7\xdb\x95c=\x16\xd5\x06\xf9O\x87\x02\xcd\xa4\xc0\xa17\x92]_\xa2>\xbb\xc8?\x98\xa6+\xcf^\xa0\xe8\x9a\x9e>O\xbf\xd3Fd\xfe\x9c|0\xdd\x7f\x85^\xdf\xe0\x84\x17\xe5\xc05\x8av\xc4\x00', &(0x7f0000000680)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac'], &(0x7f00000008c0)=[&(0x7f0000002100)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000000080)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfE\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\x06\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000001240)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a', &(0x7f0000000400)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xdf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*t\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x10(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[xS\rO\x880\xf1P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xb9\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac%~\x12\x7ft\xa9\v\xae\x9c\xf3\xb0\xb9\t\x8d\xb9p\xcb\xe3csR\xe2\xfbL\x9f\xb3\xa4^\xc1\xf7m0\xa8\xfd\xcf\xfdY\\d\x03(\x89\xe7\xe1\xcf\xa4m3SQc\xbaG\xcd\xce\xf5o@\xfdi\xd1w~\xc8\xb9\\\a\xeba\x18\x95\x94\xea\xd4\xe8\xcaP\x89\x9b\x12\xa7\xdb\x95c=\x16\xd5\x06\xf9O\x87\x02\xcd\xa4\xc0\xa17\x92]_\xa2>\xbb\xc8?\x98\xa6+\xcf^\xa0\xe8\x9a\x9e>O\xbf\xd3Fd\xfe\x9c|0\xdd\x7f\x85^\xdf\xe0\x84\x17\xe5\xc05\x8av\x00'/614]) 20:33:43 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) perf_event_open(&(0x7f0000348f88)={0x2, 0x8b, 0xe3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0x0, 0x5, 0x0, 0x7, 0x1000}, 0x0, 0x1000000000000000, r1, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r4, r5, 0x0, 0x800009) setsockopt$SO_TIMESTAMP(r4, 0x1, 0x40, &(0x7f00000001c0)=0x6e49497f, 0x4) dup(r4) sendfile(r2, r3, 0x0, 0x800009) [ 1540.835615] hub 9-0:1.0: USB hub found [ 1540.841418] hub 9-0:1.0: 8 ports detected 20:33:44 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='uid=', @ANYBLOB="48057788922ef142d1e766ff4a3623225c8fefe34f854e7f830fb623037d8cc70e4b4b49f0"]) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='autofs\x00', 0x0, &(0x7f0000000200)) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x20000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000140)={r2}) 20:33:44 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x400800009) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4), 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r4 = socket$key(0xf, 0x3, 0x2) fcntl$setlease(r4, 0x400, 0x0) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x10}, 0xc) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3}, 0xb) ftruncate(r5, 0x200004) sendfile(r0, r5, 0x0, 0x80001d00c0d0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x800009) ioctl$VIDIOC_ENUM_FREQ_BANDS(0xffffffffffffffff, 0xc0405665, &(0x7f0000000040)={0x3, 0x2, 0xfffffffe, 0x800, 0x7, 0x8647, 0x8}) 20:33:44 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0xa) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x43, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) r3 = dup2(r2, r1) ioctl$KDADDIO(r3, 0x4b34, 0x5) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) accept4$tipc(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x80000) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r4, r5, 0x0, 0x0) 20:33:44 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000100)) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000000)={0x54, r3, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}]}]}, 0x54}}, 0x0) sendfile(r2, r1, 0x0, 0x100000001) [ 1541.903586] autofs4:pid:28702:autofs_fill_super: called with bogus options [ 1541.972363] autofs4:pid:28710:autofs_fill_super: called with bogus options [ 1541.980727] audit: type=1804 audit(5885210025.113:204): pid=28701 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir017937193/syzkaller.bZbNRC/1039/cgroup.controllers" dev="sda1" ino=17959 res=1 20:33:45 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) bind$can_raw(r1, &(0x7f0000000040), 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(0xffffffffffffffff, r2, 0x0, 0x800009) 20:33:45 executing program 2: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x5, 0x0, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffbf) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) r1 = accept4$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000100)=0x1c, 0x0) sendto$inet6(r1, &(0x7f0000000200)="9000180020001fd5a2b35e7c032a4b54ebccc8642f63aef2e66e13065065d1f94cc20a6e2ad203ef365a7c71f7c3c262d1e0fc3595197c22cc51fa5e56affd9432e157ff0a525048264e8e557d6ac41f17d2c9cb529b7f58358ee13412eb06c4b812b4679bab1e3f97239006e636cba8cecabf427b2947d6a26ed98a25ab3b3a7518d22e89bd20b73e93d9188e14eec235fd930e975fea5a42b1f4c7b43ab5a6edf4e663a1107aab646da893027dc92794bff732c7431fa8f8d3e746032f2833cfc771f509dff58f380a4ce892016e3c73ad32a8cb4c4a90c1864bcd1cc36f44d055686f01f88289cfa998041f044ed70a31d0", 0xf3, 0x14, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r2 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r2, &(0x7f0000000000)='0', 0x10a73, 0x600, 0x0, 0x6f765f6f191b9a4) 20:33:45 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f00000001c0)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x2, 0x4) sendmmsg(r0, &(0x7f0000007f40)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000400)="9f", 0x2bf}], 0x1}}, {{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000940)='!', 0x1}], 0x1}}], 0x127ad, 0x0) [ 1542.135089] audit: type=1800 audit(5885210025.143:205): pid=28707 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="syz-executor.5" name="bus" dev="sda1" ino=17958 res=0 20:33:46 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:46 executing program 0: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x998f5ad4b7c79bea, 0x6, 0xffff, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') ioctl$DRM_IOCTL_DMA(0xffffffffffffffff, 0xc0406429, &(0x7f0000000500)={0x0, 0x4, &(0x7f0000000400)=[0xf372, 0x40000401, 0x7f, 0x2], &(0x7f0000000440)=[0xbc6d], 0x40, 0x2, 0x8, &(0x7f0000000480)=[0xff, 0x9], &(0x7f00000004c0)=[0x71, 0x200, 0x7, 0xf73c, 0x0, 0x2, 0x2, 0x6, 0x0]}) sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x0, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:46 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r3, r4, 0x0, 0x800009) setsockopt$SO_TIMESTAMP(r3, 0x1, 0x40, &(0x7f00000001c0)=0x6e49497f, 0x4) r5 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r6, 0x0) sendto$inet6(r0, &(0x7f0000000040)='F', 0xfffffffffffffea0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 20:33:46 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) gettid() r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) r2 = semget$private(0x0, 0x3, 0x481) semop(r2, &(0x7f00000002c0)=[{0x0, 0xffff, 0x1000}], 0x1) semctl$SETALL(r2, 0x0, 0x11, &(0x7f0000000100)) semctl$IPC_RMID(r2, 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r3, r4, 0x0, 0x800009) getsockname$ax25(r4, &(0x7f0000000040)={{0x3, @bcast}, [@bcast, @bcast, @remote, @rose, @rose, @default, @remote, @rose]}, &(0x7f00000000c0)=0x48) 20:33:46 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth1\x00', 0x0}) r2 = socket$kcm(0x10, 0x800000000002, 0x0) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r4, r5, 0x0, 0x800009) ioctl$KVM_GET_SUPPORTED_CPUID(r5, 0xc008ae05, &(0x7f0000000000)=""/51) r6 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000840)=ANY=[@ANYBLOB="700000002400d7af0104100000001fdd1475ef9d", @ANYRES32=r1, @ANYBLOB="00000000f1ffffff00000000280008801c0001000000000000fffffff00000000000000000000200020000000800020003000200060005000000000014000100706669666f5f686561645f64726f70"], 0x70}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r7, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0xe, &(0x7f0000000100)}], 0x492492492492642, 0x0) 20:33:46 executing program 5: statfs(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/218) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000480)='/dev/hwrng\x00', 0x0, 0x0) setxattr(0x0, &(0x7f0000000280)=@known='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYBLOB="0ce0f22f", @ANYRES32=0x0], 0x34}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) perf_event_open(0x0, 0x0, 0xfffffffffffffff8, r1, 0x1) ioctl$SNDRV_TIMER_IOCTL_STATUS64(0xffffffffffffffff, 0x80605414, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x77) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x5) ioctl$SNDCTL_DSP_SPEED(0xffffffffffffffff, 0xc0045002, &(0x7f0000000300)=0x90) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r3, 0x0) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000180)={0x40, 0x4, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x79}}, 0x0) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, 0x0, 0x4000010) 20:33:46 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 1543.221951] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1543.308979] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1543.506405] IPVS: ftp: loaded support on port[0] = 21 20:33:46 executing program 1: perf_event_open(&(0x7f0000348f88)={0x5, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) getcwd(&(0x7f0000000040)=""/129, 0x81) eventfd(0xffff0437) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) getsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000140), &(0x7f0000000200)=0x4) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x40, &(0x7f00000001c0)=0x6e49497f, 0x4) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) syz_init_net_socket$nl_rdma(0xffffffffffffffff, 0x3, 0x14) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r4, r5, 0x0, 0x800009) 20:33:46 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) ioctl$SG_GET_SCSI_ID(r1, 0x2276, &(0x7f0000000040)) mount(&(0x7f0000000140)=ANY=[@ANYBLOB='/dev/nbd0'], &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='xfs\x00', 0xa0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:46 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r1, r2, 0x0, 0x800009) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, &(0x7f00000000c0), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') write$P9_RFSYNC(r3, &(0x7f0000000080)={0x7, 0x33, 0x1}, 0x7) sendfile(r0, r3, 0x0, 0x800009) [ 1543.843018] IPVS: ftp: loaded support on port[0] = 21 20:33:47 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x43, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) fcntl$getflags(r2, 0x1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x80000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r3, r4, 0x0, 0x800009) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f00000000c0)={0xffffffff, 0x5, 0x4, 0x1009, 0x3, {0x77359400}, {0x4, 0x6, 0x1, 0x5, 0x11, 0x3, "96b08c89"}, 0x2, 0x1, @fd, 0xffffffc0, 0x0, 0xffffffffffffffff}) ioctl$KVM_SET_NR_MMU_PAGES(r5, 0xae44, 0xfffdffff7fffffff) 20:33:47 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f00000002c0)) wait4(r3, &(0x7f0000000040), 0x8, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9, 0x1, 'cake\x00'}, {0xc, 0x2, [@TCA_CAKE_DIFFSERV_MODE={0x8, 0x3, 0x3}]}}]}, 0x3c}}, 0x0) 20:33:47 executing program 5: statfs(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/218) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000480)='/dev/hwrng\x00', 0x0, 0x0) setxattr(0x0, &(0x7f0000000280)=@known='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYBLOB="0ce0f22f", @ANYRES32=0x0], 0x34}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) perf_event_open(0x0, 0x0, 0xfffffffffffffff8, r1, 0x1) ioctl$SNDRV_TIMER_IOCTL_STATUS64(0xffffffffffffffff, 0x80605414, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x77) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x5) ioctl$SNDCTL_DSP_SPEED(0xffffffffffffffff, 0xc0045002, &(0x7f0000000300)=0x90) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r3, 0x0) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000180)={0x40, 0x4, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x79}}, 0x0) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, 0x0, 0x4000010) [ 1544.506176] IPVS: ftp: loaded support on port[0] = 21 20:33:49 executing program 0: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0xffff, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x0, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:49 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r1, r2, 0x0, 0x800009) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x2, 0x6, 0x201, 0x0, 0x0, {0x1, 0x0, 0x2}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x41}, 0x4000000) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r3, 0x0, 0x800009) 20:33:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x6, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xe, 0xffffffffffffffff, 0x0) setresuid(0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) setresuid(0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fstat(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) setresuid(0x0, r1, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r5 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r5, r3, r4) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r9 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r9, r7, r8) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000540)=ANY=[@ANYBLOB="02000000010004000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000600", @ANYRES32, @ANYBLOB="35bae7b5", @ANYRES32=r1, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000000", @ANYRES32=r4, @ANYBLOB="020000000093a75b7651a515dac83d229efc57f50eac2d0d74b50d0c50ce7a777668832fbfe713de5b7381ecdbf9b1587b444c79f9f28c26ec424d76c932e90d64847ebe879f3bd62b50327c56cb978413be2ad446b58241a3e2ad232608833c56053302399a7e4e55fb2fc563f789bde526ef780000000000000000", @ANYRES32=r8, @ANYBLOB="08000000d9e0c2e5e5c1feb82833820ccd72e167efcda92b677d4039eaa98b8aa565204212fbdd28aa86c82c5ec7d9e13ec2b0d75266401e7e9ae6d0d402a2758d21d77f3bb028ce13cfbd4db2b602826e003bbcb6a808572587c7cba2dc7ca33569c1", @ANYRES32=0xee01, @ANYBLOB="10000100000000002000010000000000"], 0x6c, 0x2) socket(0x10, 0x80002, 0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) 20:33:49 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x8a40, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getpeername(0xffffffffffffffff, &(0x7f0000000380)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private2}}}, &(0x7f0000000100)=0x80) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000008000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f320f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f32f090f013a360f06ed", 0x42}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r4, 0x4068aea3, &(0x7f00000001c0)={0x7b}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000007, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8801, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r5, r6, 0x0, 0x800009) bind$rose(r6, &(0x7f0000000240)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, 0x0, [@bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x40) ioctl$KVM_RUN(r4, 0xae80, 0x0) syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) 20:33:49 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:49 executing program 3: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:49 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7, 0x0, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) 20:33:49 executing program 5: ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e24, @loopback}}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$netlink(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x80003, 0x6b) r3 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) bind$packet(r3, &(0x7f0000000240)={0x11, 0x0, r4}, 0x14) getsockname$packet(r3, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r6, r7, 0x0, 0x800009) setsockopt$SO_TIMESTAMP(r6, 0x1, 0x40, &(0x7f00000001c0)=0x6e49497f, 0x4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=ANY=[@ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="c32cfd64b6a762019e2d717d17aff775a5fc64f82aa83d001228988809b4451a6cb3e73e6dfc524891cfc6cdb72dc598e2ebe7b76ebf1b8560ce85e4198fbd08a006af38ec02f7a6b28edc0e1e13425624247ec08ce9f2b1a1e3c15a0251a3aaa5cbe4bc27929da49bce0cd31e77675ba80e69a4fa3e4cf4399fe7ddbb3cfcc70698a27d74a3e2760311c364f8381fdc741d79c0aee29431cb59a17da5f2b8e7675613f01ef1af3bd6", @ANYRES64, @ANYRESOCT], 0x28}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r8, r9, 0x0, 0x800009) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000000)={0xffffffffffffffff, r9}) 20:33:49 executing program 0: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b0304001a0000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f8055d26b9a488a9949d3b7e56f0bf0893cc714959531482a9939ea28f3a5d3f608d47ce9ca1fc95bd12df5b822a72e6"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0xffff, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, &(0x7f0000000240)={@my=0x1}) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x0, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:49 executing program 3: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:50 executing program 0: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x800009) getsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), &(0x7f0000000240)=0x4) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_GET_FP_MODE(0x2e) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20000, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0xffff, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x1) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x0, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:50 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000240)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r2, 0x1) syz_emit_ethernet(0x4e, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd600cfdff0018060000000000000000000000000002000000fe8000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="60c20000907800007e04f989"], 0x0) 20:33:50 executing program 3: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:50 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000580)=@newqdisc={0x2c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_mq={0x7, 0x1, 'mq\x00'}]}, 0x2c}}, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000580)=@newqdisc={0x2c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_mq={0x7, 0x1, 'mq\x00'}]}, 0x2c}}, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000580)=@newqdisc={0x2c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_mq={0x7, 0x1, 'mq\x00'}]}, 0x2c}}, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000f40)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000f00)={&(0x7f0000000a00)={0x4cc, 0x0, 0x20, 0x70bd26, 0x25dfdbfd, {}, [{{0x8}, {0xe8, 0x2, 0x0, 0x1, [{0x74, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x44, 0x4, [{0x1, 0x2, 0x5, 0x3}, {0x7, 0x80, 0x70, 0x7}, {0x3, 0x7f, 0x7f, 0x7fff}, {0x2, 0x3f, 0x81, 0x100}, {0xffff, 0x7f, 0x3, 0x83}, {0x8, 0x7f, 0xff, 0x7}, {0x4, 0x8, 0x4, 0x4}, {0x100, 0x9, 0x80, 0x4}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x6}}}]}}, {{0x8}, {0xb8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x84, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x80}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}]}}, {{0x8}, {0x1b0, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x80}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0xe1}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0xffffffc0}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}]}}, {{0x8, 0x1, r3}, {0xbc, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x81}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0xc8}}}]}}]}, 0x4cc}, 0x1, 0x0, 0x0, 0x40804}, 0x40) sendfile(r0, r1, 0x0, 0x800009) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r8, r9, 0x0, 0x800009) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r9, 0x894b, &(0x7f0000000040)) 20:33:50 executing program 2: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x37cb1133) socket$inet(0x2, 0x3, 0x33) socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x19404, 0x0) socket(0x0, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r3, r4, 0x0, 0x800009) setsockopt$SO_TIMESTAMP(r3, 0x1, 0x40, &(0x7f00000001c0)=0x6e49497f, 0x4) sendmsg$NFT_MSG_GETSETELEM(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000080)={&(0x7f00000002c0)={0x15c, 0xd, 0xa, 0x900, 0x0, 0x0, {0x0, 0x0, 0x1}, [@NFTA_SET_ELEM_LIST_ELEMENTS={0x148, 0x3, 0x0, 0x1, [{0x4}, {0x140, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_USERDATA={0x4c, 0x6, 0x1, 0x0, "4bac3f34cd1139601f323232361b2dfe4bfc5e40765ee00003316a69dd35fc7c1b2c035e66f2c919d8dfde30b862fee668dddabef7b833733e282c9f69cc6d504d46a7800dede9f2"}, @NFTA_SET_ELEM_DATA={0xf0, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0x77, 0x1, "a3b892737bbb98bda7fd0b3b092e0da04e22b44db2bba12b5849ae68f85e8ef9dcec029835906a7539b2ccc1d3c7ead942a12d08b520ebf4619944c39d63dc0724f31637d8f6d80043f8987b59f9fa34cacb68811855f2edc287b69ec12982133a10992c1fd823d7224b2c287c273011452784"}, @NFTA_DATA_VERDICT={0x68, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}]}]}]}]}, 0x15c}, 0x1, 0x0, 0x0, 0x8040000}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000040), 0x14) 20:33:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x6, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000340)={0x5, 0x3ff, 0x0, 0x6, 0x0, 0x7fff, 0x0, 0x0, 0x0}, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000003c0)={0x0, 0x2483, 0x0, 0x5, 0x40, 0x2, 0xff, 0x0, r1}, &(0x7f0000000400)=0x20) r2 = socket(0x40000000002, 0x3, 0x80000000002) setsockopt$inet_int(r2, 0x0, 0x4, &(0x7f0000000080), 0x4) openat$bsg(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0x6c500, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe83, 0x11, 0x0, 0x27) msgrcv(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000600000000000000000000000000f1e2a56da4a267a86b00"/150], 0x1, 0x0, 0x3000) 20:33:52 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:52 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r3, r4, 0x0, 0x800009) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_REVISION_TARGET(r5, 0x0, 0x43, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) fstat(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x2003010, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[], [{@smackfstransmute={'smackfstransmute', 0x3d, 'cxildren\x00\xa4\xd6\xeb\x94\xa7\x98\x94{V\x7f\xe0\xbd7\xf6\xcb\x8c\n\xc9\x1d\x8cE\x9c(Dy60 \x9d\xd2\x87\xd5\xab\xde\n0\t\xa6\x10|\xc8\x00V\x9bZU\xda\n\x89\x90v\xd7\xdd\xa8\x8a}fwp\xa6\xc6+\xd0\xbc\xe9\xbc\x98G\x19\xf1Av%\xd3\xdc\xed\xe1\x1d\xb3\xa6\xa1\xd3C\xae\"\xe1Oy,\xddb\xe2\xc9\x10\xc1\x89&\xf08\xac\bT\xc9-&\xdb\xf1\xc5\x1d\xf8Q\xech\x1f\x99\xc0\xa0\xe3y\x1d\xab\x82\xd9\xa2\xd9\xb0\x7f[\xbf\x1dV\"\xf8\xd9\xcfR\xc8\x84\xea\xb8\xe1\x9a\xbe{@\xbc\x1b\xdeMp\xa6\xe3(\xa6}\x87'}}, {@euid_lt={'euid<', r6}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, '+'}}]}}) sendfile(r1, r2, 0x0, 0x800009) 20:33:52 executing program 0: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) openat$vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vsock\x00', 0x8000, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0xffff, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x0, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:52 executing program 2: getrusage(0x0, 0x0) r0 = getpgid(0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3cde}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r3, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') write$P9_RCLUNK(r4, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000300)=0x5b11, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) socket$netlink(0x10, 0x3, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, 0x0, 0x48000) dup(r2) ptrace$cont(0x1f, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4) sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, 0x0, 0x1010) ftruncate(r4, 0x80006) sendfile(r3, r4, 0x0, 0x8000fffffffe) pipe(&(0x7f0000000040)) 20:33:52 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$NFQNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x28, 0x2, 0x3, 0xa03, 0x0, 0x0, {0x0, 0x0, 0x1}, [@NFQA_CFG_PARAMS={0x9, 0x2, {0x1, 0x2}}, @NFQA_CFG_CMD={0x8, 0x1, {0x1}}]}, 0x28}}, 0x0) r2 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r2, &(0x7f0000000140), 0xffffffffffffff68, 0x0) 20:33:52 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r5, r6, 0x0, 0x800009) ioctl$VHOST_GET_VRING_BASE(r6, 0xc008af12, &(0x7f0000000000)) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001080)={0x60, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x30, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_NODEID={0xc}]}, @TIPC_NLA_NET={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_NODEID_W1={0xc}]}]}, 0x60}}, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000005b00)={0x0, 0x0, &(0x7f0000005a00)=[{&(0x7f0000000440)={0x148, 0x0, 0x0, 0x0, 0x0, "", [@nested={0x137, 0x0, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="08604ce6f05fad28694d00263d8f0da63951bed0dbe6cf6db75149dc541e21f5287e8f27a7e120c2ddfb82558542abe07df95a6a6815117beb59f5415415be7ba8db51a9c0480b7fd50006570b3551a11aa93a6f103bb466b6830946d2ec7073bf4651dc5a5b93a42474b139989356e699aa8be3d6b373c2746b4670632c85bc872cd43386a2fbb8b36b10a837cddaa6d6c4b7f5c516a8cbbbf723f99d06f8a21cc54407be4ec37a826eff0baa2a677235807bfaff9d62079269b889202c4b10aa99de504276bc8613bb", @generic="f0981d0fdc95634ba77e1777a2a0d6f71bbcca11dd1ab7e1bc2729e2e3354c516a30e3e7806fde6215e2652e7d571896364561ef8acb442b3a9a900e32a56e8e6e1a77d5e2481e1823547d8f9dc2cf73371687242c14bcd4a295063a856d6f9de7"]}]}, 0x148}], 0x1}, 0x0) 20:33:52 executing program 0: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0100000013328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc714959531464db824cf5162443ba92ee77402306f336b7647059d0a41b057259a186ee8434c4567bf2ca0846c7f527aef9a2201900000000000000448398711a3c8c158af48ed2e81e4a00b37e8ea4d1870b8bc23cabd1c595f6253e53ad692c297723cc3dc744cbc307ca305bd264f248d35d621a60fe115e3415ffbbfe1a8105ed749a05b8f55ad8065a48dc97b0834f998cdc7bac649b68"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0xffff, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x0, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:52 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x9) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x74, 0x5, 0x6, 0x101, 0x0, 0x0, {0x2, 0x0, 0x1}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz2\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz2\x00'}]}, 0x74}, 0x1, 0x0, 0x0, 0x8001}, 0x47) 20:33:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468", @ANYRES32=0x0], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000009000100686673630000000008000200"], 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="3c0000002c00270d28bd70000000000000000000", @ANYRES32=r5, @ANYBLOB="0a00000000000000050000000c0001007463696e646578"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=@gettfilter={0x24, 0x2e, 0x63ee8762c75d8929, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x24}}, 0x0) 20:33:53 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x800009) [ 1549.937003] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1550.034012] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 20:33:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000040), 0x4) sendmsg$RDMA_NLDEV_CMD_STAT_SET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x1410, 0x0, 0x0, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_STAT_RES={0x8}, @RDMA_NLDEV_ATTR_STAT_RES={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x40004}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@local, @in=@broadcast, 0x0, 0x9, 0x4e23, 0x5, 0x2, 0x20, 0x0, 0x3a, 0x0, r0}, {0x5, 0x0, 0x6, 0x6, 0x1, 0x7dc21de, 0x6, 0x2}, {0xfffffffffffeffff, 0x7, 0x0, 0x6}, 0x4, 0x6e6bb5, 0x0, 0x0, 0x2}, {{@in6=@mcast1, 0x4d2}, 0xa, @in=@empty, 0x3502, 0x0, 0x2, 0x3, 0x7f, 0x7, 0x7ff}}, 0xe4) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4, r3}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 1550.086380] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1550.109854] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 20:33:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="1c00000007ffff0f00e18ab4b2b29555a401f86f4e00017ac5edba316d4cc109572a126978533f259b9aa7ddb4da56ded469aaae78468b8605d35f888590cf1ff94e5815c28376126bd91f3a72717e"], 0x12) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x64, 0x36, 0x39, 0x38, 0x0, 0x55, 0x63], 0x2d, [0x62, 0x31, 0x64], 0x2d, [0x32, 0x32, 0x0, 0x37], 0x2d, [0x36, 0x36, 0x66, 0x30], 0x2d, [0x35, 0x0, 0x35, 0x39, 0x37, 0x35, 0x32, 0x34]}}}, {@obj_user={'obj_user', 0x3d, '^'}}, {@euid_eq={'euid', 0x3d, r3}}, {@smackfsdef={'smackfsdef', 0x3d, 'sha224\x00'}}, {@context={'context', 0x3d, 'user_u'}}]}}) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) connect$inet(0xffffffffffffffff, 0x0, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10001) socket$alg(0x26, 0x5, 0x0) getpeername$packet(r4, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0xfffffffffffffef8) 20:33:55 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:55 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x400000000000000, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r1, r2, 0x0, 0x800009) ioctl$DRM_IOCTL_GET_CAP(r2, 0xc010640c, &(0x7f0000000140)={0x2}) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r4, r5, 0x0, 0x800009) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r6, r7, 0x0, 0x800009) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r8, r9, 0x0, 0x800009) ioctl$VIDIOC_S_SELECTION(r9, 0xc040565f, &(0x7f0000000240)={0x1, 0x101, 0x4, {0x0, 0x10001, 0x3d, 0x10}}) ioctl$KVM_SET_CPUID2(r7, 0x4008ae90, &(0x7f0000000180)={0x4, 0x0, [{0x4, 0x100, 0x5, 0x8, 0x1f, 0x7, 0x20}, {0x4, 0x3, 0x0, 0x1000, 0x1, 0x8, 0x2}, {0x40000000, 0xfffffff7, 0x401ddfa9280b4f5, 0xfffffffa, 0xfffffc01, 0x5, 0xffff}, {0x0, 0x1, 0x4, 0x3, 0x9, 0x3, 0x1ff}]}) ioctl$DRM_IOCTL_MODE_SETGAMMA(r5, 0xc02064a5, &(0x7f0000000100)={0xb, 0x9, &(0x7f0000000040)=[0x3, 0xad3c, 0x4, 0x5, 0x9b, 0x3, 0x0, 0x81, 0x6], &(0x7f0000000080)=[0x1f, 0x0], &(0x7f00000000c0)=[0x0, 0x7ff, 0x1, 0xff]}) sendfile(r0, r3, 0x0, 0x800009) 20:33:55 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xa3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/cuse\x00', 0x2842, 0x0) io_setup(0x1, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000002600)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x8001a0}]) 20:33:55 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000340)=0x14) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="ec0100002800270d00"/20, @ANYRES32=r2, @ANYBLOB="0080"], 0x1ec}}, 0x0) 20:33:55 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000340)=0x14) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="ec0100002900270d00"/20, @ANYRES32=r2, @ANYBLOB="0080"], 0x1ec}}, 0x0) [ 1552.453232] netlink: 456 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1552.478626] netlink: 456 bytes leftover after parsing attributes in process `syz-executor.3'. 20:33:55 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 1552.516973] netlink: 456 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1552.541944] netlink: 456 bytes leftover after parsing attributes in process `syz-executor.3'. 20:33:55 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) 20:33:55 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x145540, 0x24) ioctl$SCSI_IOCTL_START_UNIT(r1, 0x5) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r2, 0x0, 0x800009) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r3, r4, 0x0, 0x800009) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000140), 0x8) getpeername$unix(r1, &(0x7f0000000080)=@abs, &(0x7f0000000100)=0x6e) 20:33:55 executing program 2: 20:33:55 executing program 0: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="b321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085c476ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd16a6ef166da1658a4bf88936e8b49595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0xffff, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x0, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:55 executing program 3: [ 1552.719098] audit: type=1800 audit(5885210035.853:206): pid=29186 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16710 res=0 20:33:55 executing program 2: 20:33:55 executing program 3: 20:33:56 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000080)={0x20, 0x4, 0x4, 0x40, 0x5a, {0x77359400}, {0x1, 0x1, 0xa9, 0x21, 0xec, 0x7, "e58eaeaf"}, 0xb5e3, 0x4, @offset=0x64, 0x4, 0x0, 0xffffffffffffffff}) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r3, r4, 0x0, 0x800009) ioctl$SIOCRSSL2CALL(r4, 0x89e2, &(0x7f0000000240)=@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}) fcntl$getflags(r2, 0x1) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x5c, 0x4, 0xa, 0x5, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_CHAIN_TYPE={0xb, 0x7, 'filter\x00'}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x10040885}, 0x40c0) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r5, r6, 0x0, 0x800009) ioctl$KVM_ARM_SET_DEVICE_ADDR(r6, 0x4010aeab, &(0x7f0000000040)={0x5, 0x2}) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r7, r8, 0x0, 0x800009) 20:33:56 executing program 0: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c4e3020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0ea8bc7713328b5e4577124d1a2e21da765cd1ce2356a8f87e2bf0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0xffff, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x0, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000008, 0x1010, r1, 0xa0571000) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:56 executing program 3: 20:33:56 executing program 2: [ 1552.793665] audit: type=1800 audit(5885210035.883:207): pid=29189 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16710 res=0 20:33:58 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:58 executing program 3: 20:33:58 executing program 2: 20:33:58 executing program 0: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0xffff, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x0, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) r5 = syz_open_dev$media(&(0x7f0000000240)='/dev/media#\x00', 0x80000000, 0x88200) getpeername$l2tp(r5, &(0x7f0000000340)={0x2, 0x0, @initdev}, &(0x7f0000000400)=0x10) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:58 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) sendmsg$AUDIT_ADD_RULE(r1, &(0x7f0000000500)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000004c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x434}, 0x1, 0x0, 0x0, 0x8001}, 0x40800) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @remote, @empty}, &(0x7f0000000580)=0xc) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) recvfrom$rose(0xffffffffffffffff, &(0x7f0000000600)=""/160, 0xa0, 0x2161, 0x0, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r4, r5, 0x0, 0x800009) ioctl$UI_GET_SYSNAME(r5, 0x8040552c, &(0x7f00000005c0)) sendfile(r2, r3, 0x0, 0x800009) 20:33:58 executing program 5: 20:33:58 executing program 3: 20:33:58 executing program 2: 20:33:58 executing program 5: 20:33:58 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r1, r2, 0x0, 0x800009) getsockopt$IP_VS_SO_GET_INFO(r2, 0x0, 0x481, &(0x7f0000000100), &(0x7f0000000140)=0xc) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x6}, 0x1) sendfile(r0, r3, 0x0, 0x800009) 20:33:59 executing program 0: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) dup2(r1, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0xffff, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x0, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:33:59 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5], 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x8009}}, 0x20}}, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000090000000300000000020000b400000000000000b800000000000000000000006c01000070010000700100006c010000700100000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009400b4000000000000000000000000000000000000000000240074746c000000000000000000000000000000000000000000000000000000010000002000545241434500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000006000000000000000000000000000000000000000000000000000000000000000000000000007000b80000000000000000000000000000000000000000004800544545000000000000000000000000000000000000000000000000000001ff020000000000000000000000000001677265746170300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000940000000000000000000000000000000000000000002400000000000000000000000000000000000000000000000000000000000000feffffff"], 0x25c) syz_emit_ethernet(0x2a, &(0x7f0000000080)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x16, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}}, 0x0) socketpair(0xa, 0x800, 0x565, &(0x7f0000000040)) [ 1555.979011] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1556.070279] bridge2: port 1(syz_tun) entered blocking state [ 1556.085466] bridge2: port 1(syz_tun) entered disabled state [ 1556.092512] device syz_tun entered promiscuous mode [ 1556.124238] bridge2: port 1(syz_tun) entered blocking state [ 1556.130075] bridge2: port 1(syz_tun) entered forwarding state [ 1556.135202] bridge2: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 1556.154567] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1556.165784] bridge2: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) 20:34:01 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:34:01 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x9, 0x3, 0x218, 0x0, 0x0, 0x0, 0xcc, 0xcc, 0x184, 0x184, 0x184, 0x184, 0x184, 0x3, 0x0, {[{{@ip={@loopback, @remote}, 0x0, 0xac, 0xcc, 0x0, {}, [@common=@unspec=@limit={{0x3c, 'limit\x00'}, {0x0, 0xb62}}]}, @unspec=@TRACE={0x20, 'TRACE\x00'}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@remote, 'macvlan1\x00'}}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x274) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x3fc) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000240)=0x1, 0xed) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='veth1\x00', 0x10) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @initdev}, 0x10) setsockopt$inet_tcp_int(r2, 0x6, 0x4000000000013, &(0x7f0000000100), 0x1042b) 20:34:01 executing program 1: perf_event_open(&(0x7f0000348f88)={0x5, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, @perf_bp={&(0x7f0000000040), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) 20:34:01 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) 20:34:01 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000340)=@raw={'raw\x00', 0x9, 0x3, 0x268, 0x0, 0xffffffff, 0xffffffff, 0xd8, 0xffffffff, 0x1d4, 0xffffffff, 0xffffffff, 0x1d4, 0xffffffff, 0x3, 0x0, {[{{@ip={@rand_addr, @rand_addr, 0x0, 0x0, 'team0\x00', 'ipvlan0\x00'}, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0xcb, 0x0, '\x00', 'syz1\x00'}}}, {{@ip={@loopback, @remote, 0x0, 0x0, 'rose0\x00', 'team_slave_0\x00'}, 0x0, 0x94, 0xfc, 0x0, {}, [@inet=@rpfilter={{0x24, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x2c4) tkill(r0, 0xb) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$FS_IOC_RESVSP(r3, 0x402c5828, &(0x7f0000000080)={0x0, 0x0, 0x4, 0x8001}) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 20:34:01 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5], 0x28}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5, 0x8009}}, 0x20}}, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="7261770000000000000000000000000000000000000000000000000000000000090000000300000000020000b400000000000000b800000000000000000000006c01000070010000700100006c010000700100000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009400b4000000000000000000000000000000000000000000240074746c000000000000000000000000000000000000000000000000000000010000002000545241434500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000006000000000000000000000000000000000000000000000000000000000000000000000000007000b80000000000000000000000000000000000000000004800544545000000000000000000000000000000000000000000000000000001ff020000000000000000000000000001677265746170300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000940000000000000000000000000000000000000000002400000000000000000000000000000000000000000000000000000000000000feffffff"], 0x25c) syz_emit_ethernet(0x2a, &(0x7f0000000080)={@multicast, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x16, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}}, 0x0) socketpair(0xa, 0x800, 0x565, &(0x7f0000000040)) 20:34:01 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/if_inet6\x00') preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000280)=""/184, 0xb8}], 0x1, 0x0) [ 1558.723016] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 20:34:01 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x145800, 0x0) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000000040)) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 20:34:01 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000240)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x20000c}) 20:34:01 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x40, 0x0) write$midi(r0, &(0x7f0000000100)="9edda4a3526b491591b769cd759ae0d2a35b3c2b0351b2d4c5b2c61dbe5b", 0x1e) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r1, r2, 0x0, 0x800009) ioctl$RNDADDENTROPY(r2, 0x40085203, &(0x7f0000000080)=ANY=[@ANYBLOB="0180458709ce136970b8144a7fc910a5fe885e93bdde1907c5bddbbcb6371b4b85091994d4b64000e8f79a4d3e2129e1cf02001c66fe42a10056474ddc45"]) [ 1558.826988] device syz_tun left promiscuous mode [ 1558.832146] bridge2: port 1(syz_tun) entered disabled state 20:34:02 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:34:02 executing program 0: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7ea290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f856f0bf8893cc7149595314f0771b65d33e129933dd93f99f03cd6b3e5903e1ddb592a67f706eb14c1d3d1a204fe2e9c5"], 0x194) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 1558.880322] bridge3: port 1(syz_tun) entered blocking state [ 1558.911132] bridge3: port 1(syz_tun) entered disabled state [ 1558.963540] device syz_tun entered promiscuous mode [ 1559.038130] bridge3: port 1(syz_tun) entered blocking state [ 1559.044016] bridge3: port 1(syz_tun) entered forwarding state [ 1559.118756] IPv6: ADDRCONF(NETDEV_UP): bridge3: link is not ready 20:34:02 executing program 3: r0 = syz_open_procfs(0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) r1 = gettid() r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r1) write$binfmt_script(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x194) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(0x0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0x3f}, 0x16, 0x0) close(r2) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000340)=@v2, 0x14, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) 20:34:02 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.events\x00', 0x0, 0x0) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000080)=0x6, 0x4) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') r3 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000001140)='/dev/ocfs2_control\x00', 0x400, 0x0) sendto$inet(r3, &(0x7f0000001180)="6288709865c9b1ae32aaddb4a393e5dab27ee602c06e26d0804a097042ead0905c912c129c2f95d31d3e83191d9d75e6f132740cfd9ba5cc38f5ee273b7d8a23d7ca55cb327082395ab330c7209ccb66a0cacc9bef7814dec394985d10eb2e8e426cef196234c4f71a57dc47ba47879756b62a3ffb5c729005392aed8f1ad03a60e99c7d7615bafae507d65023d606dd2f7f35cde5b9ce52c31095ea9a5cb31672ba3c28c8df815fa720e656dfc0f1eb474db97c017848788a037ecf8f9d39d2e9d1d8bff0381f5ef6450ff9b86543a9c8d32b44bece362fab4b5e9551dbec71f9333477867ca48cc6b77883136f9abe7f", 0xf1, 0x44040, &(0x7f0000001280)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10) sendfile(r1, r2, 0x0, 0x800009) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r4, r5, 0x0, 0x800009) ioctl$sock_bt_hci(r5, 0x400448e7, &(0x7f00000000c0)="c89ada2549e512ec081d75b1e2a787463cb1ae89f161718ef3825664c4378b8c3c330e64aca1f554aa01a86be05ae5cfe4a36b81c469204684e287721e185efb0acf1ee27a2b5806d4228c18a39a9572bfb7bc3d902f298b6e3fb2084811c370b10b63918d0dc48a7069c485c97ea6ad8ba61e34") r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r7, r8, 0x0, 0x800009) ioctl$NS_GET_PARENT(r8, 0xb702, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r6, 0x0, 0x43, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) ioctl$EXT4_IOC_MIGRATE(r6, 0x6609) 20:34:02 executing program 5: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x7}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r0, r1, &(0x7f0000000300)=0x100000, 0x8002) 20:34:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x408}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3) r1 = socket(0x10, 0x2, 0x0) write(r1, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) recvmmsg(r1, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000080)=ANY=[], 0x28) socket$nl_generic(0x10, 0x3, 0x10) 20:34:02 executing program 2: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, r1, 0xe7a035cf4856fee5}, 0x14}}, 0x0) 20:34:02 executing program 2: 20:34:02 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) r4 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r5, 0x0) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r9 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r9, r7, r8) write$FUSE_CREATE_OPEN(r3, &(0x7f0000001b00)={0xa0, 0x0, 0x4, {{0x400, 0x3, 0x4, 0x61, 0x10001, 0xfdd3, {0x6, 0xc8000000000, 0x2, 0x2, 0x3f, 0x81, 0x3, 0xfffff800, 0x1, 0x7, 0xbf, r5, r8, 0xfe0000, 0x1ff}}, {0x0, 0x8}}}, 0xa0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000001a40)={0xfffffff8, 0x10001, 0x1, 'queue1\x00', 0x5}) r10 = socket$nl_netfilter(0x10, 0x3, 0xc) futex$FUTEX_WAIT_MULTIPLE(&(0x7f00000014c0)=[{&(0x7f0000000040)=0x2, 0x2}, {&(0x7f0000000080)=0x1, 0x1}, {&(0x7f00000000c0)=0x1}, {&(0x7f0000000100)}, {&(0x7f0000000140), 0x1}, {&(0x7f0000000180)=0x2, 0x2}, {&(0x7f00000001c0)=0x2, 0x2}, {&(0x7f0000000200)=0x2, 0x2}, {&(0x7f0000000240)=0x2}, {&(0x7f0000000280)=0x1, 0x2}, {&(0x7f00000002c0)=0x2, 0x2}, {&(0x7f0000000300), 0x2}, {&(0x7f0000000340)=0x2}, {&(0x7f0000000380), 0x1}, {&(0x7f00000003c0), 0x1}, {&(0x7f0000000400)=0x2, 0x1}, {&(0x7f0000000440)=0x2, 0x1}, {&(0x7f0000000480), 0x1}, {&(0x7f00000004c0)=0x1, 0x2}, {&(0x7f0000000500)}, {&(0x7f0000000540)=0x2, 0x1}, {&(0x7f0000000580)=0x1}, {&(0x7f00000005c0), 0x1}, {&(0x7f0000000600)=0x1, 0x1}, {&(0x7f0000000640)=0x2, 0x1}, {&(0x7f0000000680)=0x1, 0x2}, {&(0x7f00000006c0), 0x2}, {&(0x7f0000000700)}, {&(0x7f0000000740)=0x1, 0x2}, {&(0x7f0000000780)=0x1}, {&(0x7f00000007c0)=0x2, 0x1}, {&(0x7f0000000800)=0x1, 0x2}, {&(0x7f0000000840)=0x2, 0x1}, {&(0x7f0000000880)=0x1}, {&(0x7f00000008c0)=0x2}, {&(0x7f0000000900)=0x2}, {&(0x7f0000000940)=0x1, 0x1}, {&(0x7f0000000980)=0x2, 0x1}, {&(0x7f00000009c0)=0x1, 0x2}, {&(0x7f0000000a00)=0x2, 0x1}, {&(0x7f0000000a40)=0x2}, {&(0x7f0000000a80)=0x1, 0x2}, {&(0x7f0000000ac0), 0x2}, {&(0x7f0000000b00)=0x2, 0x2}, {&(0x7f0000000b40)}, {&(0x7f0000000b80)=0x2, 0x2}, {&(0x7f0000000bc0)=0x2, 0x1}, {&(0x7f0000000c00), 0x1}, {&(0x7f0000000c40)=0x2}, {&(0x7f0000000c80), 0x2}, {&(0x7f0000000cc0)=0x2}, {&(0x7f0000000d00)}, {&(0x7f0000000d40), 0x2}, {&(0x7f0000000d80)=0x2}, {&(0x7f0000000dc0)=0x2}, {&(0x7f0000000e00)=0x1, 0x1}, {&(0x7f0000000e40)=0x1}, {&(0x7f0000000e80), 0x2}, {&(0x7f0000000ec0), 0x1}, {&(0x7f0000000f00)=0x1, 0xfffffffe}, {&(0x7f0000000f40)=0x2, 0x1}, {&(0x7f0000000f80)=0x1, 0x1}, {&(0x7f0000000fc0)=0x2, 0x1}, {&(0x7f0000001bc0)=0x2, 0x1}, {&(0x7f0000001040)=0x2}, {&(0x7f0000001080)=0x1, 0x1}, {&(0x7f00000010c0)=0x1, 0x1}, {&(0x7f0000001100), 0x1}, {&(0x7f0000001140), 0x2}, {&(0x7f0000001180)=0x1}, {&(0x7f00000011c0)=0x2, 0x2}, {&(0x7f0000001200)=0x2, 0x1}, {&(0x7f0000001240)=0x1, 0x2}, {&(0x7f0000001280), 0x8}, {&(0x7f00000012c0)=0x2, 0x1}, {&(0x7f0000001300)=0x1, 0x1}, {&(0x7f0000001340)=0x1, 0x1}, {&(0x7f0000001380), 0x1}, {&(0x7f00000013c0)}, {&(0x7f0000001400)=0x1}, {&(0x7f0000001440), 0x2}, {&(0x7f0000001480)=0x1, 0x2}], 0xd, 0x52, &(0x7f0000001a00)={0x0, 0x3938700}, 0x0, 0x0) r11 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r10, r11, 0x0, 0x800009) 20:34:03 executing program 2: [ 1559.916420] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=29360 comm=syz-executor.1 20:34:03 executing program 2: [ 1560.055211] IPv6: ADDRCONF(NETDEV_CHANGE): bridge3: link becomes ready 20:34:03 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r1, r2, 0x0, 0x800009) ioctl$PPPIOCATTACH(r2, 0x4004743d, &(0x7f0000000040)) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r3, 0x0, 0x800009) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x900000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r3, 0x1) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r3, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x20, 0x140a, 0x100, 0x70bd2a, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x4}, @RDMA_NLDEV_ATTR_RES_LQPN={0x8, 0x15, 0x1}]}, 0x20}, 0x1, 0x0, 0x0, 0xc011}, 0x40000) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(0xffffffffffffffff, r6, 0x0, 0x800009) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000340)='nl80211\x00') sendmsg$NL80211_CMD_START_AP(r6, &(0x7f0000000680)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000380)={0x2a8, r7, 0x2, 0x70bd29, 0x25dfdbfc, {}, [@NL80211_ATTR_IE={0x291, 0x2a, "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"}]}, 0x2a8}, 0x1, 0x0, 0x0, 0x4005}, 0x4800) getsockopt$inet_opts(r2, 0x0, 0x0, &(0x7f0000000080)=""/198, &(0x7f0000000180)=0xc6) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_REVISION_TARGET(r8, 0x0, 0x43, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) ioctl$FS_IOC_FSGETXATTR(r8, 0x801c581f, &(0x7f00000001c0)={0x1, 0x9e, 0x80, 0x6, 0xfffffffe}) sendfile(r4, r5, 0x0, 0x800009) 20:34:05 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:34:05 executing program 2: 20:34:05 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x2a8c28, &(0x7f0000000340)={[{@size={'size', 0x3d, [0x6d]}}]}) 20:34:05 executing program 5: 20:34:05 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) r2 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="6ffe000000000000000003000000580001800d000100"], 0x3}}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x84, r2, 0xa06, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x40, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1ff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x400}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3f}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x101}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3ff}]}, @TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x20}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x100}]}, @TIPC_NLA_LINK={0x1c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}]}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x40800}, 0x48800) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r3, r4, 0x0, 0x800009) 20:34:05 executing program 0: 20:34:05 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x2a, &(0x7f0000000680)={{{@in6=@dev, @in6=@dev}}, {{@in6=@private2}, 0x0, @in6=@private1}}, 0xe8) 20:34:05 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(0x0, 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x40fdf) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) 20:34:05 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000009e40)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) write$P9_RCREATE(r0, &(0x7f0000009e80)={0x18}, 0x18) 20:34:05 executing program 2: pipe(&(0x7f0000000040)) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fallocate(r0, 0x100000001, 0x0, 0x28120001) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, 0x0) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x88002, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) dup(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x18100, 0x0) 20:34:05 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x2, &(0x7f0000000680)={{{@in6=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa, 0x88}}, {{@in6=@private2}, 0x0, @in6=@private1}}, 0xe8) 20:34:05 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x6, &(0x7f00000006c0)={0x7f, {{0x29, 0x0, 0x2000000, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}}, {{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, 0x108) 20:34:08 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:34:08 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x100082) memfd_create(&(0x7f0000000680)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa0\x16\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2O\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc0\xdc\x14\xeb\f\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xf7v\x87\xbb\xaf\xaa\xf8\xd68\x813a/\xc41\xae\x14\"\x85\x99\x97\xed\xec\x13\x8a\xe2E\xab/\xd4TE\f\xe9<\".\xc6\xbcK\xf8T=6\'\x05u\x8f\x01\xb8\xce{\x9d\xb0\xee\x1e\x89\x13Ze\xa5\xf4\x16\x93\xaa\x19V\x10\x11?\x82|\x11#\x015\x836>x\x06\xbd7S\x9c!\xee\xf6\xa4\x9aqf\xe7-+(m\xaf\x1f\x8dzqW\b\xa5x\xf1r\xf1\xc6u\x8d\xd1@\xf2\xb0\x93\x98f)\x1e)K\x81\x90n\x9c\xcf5\xb9\xbc\x14\xd84/\x9c8[/\x99k\xa5\x9fc0j\xc1!\xec\xe2\xba\x1f\x8c\xe4\x1a\x83\x1b\x84> 5Ib\x8c\x8e`\x92\xcbc\xd5\x18\x80x\x15\xa5\x84\x1e\xd4\x86\x19\x1a\xbcU\xf4Da\xbaP\xa8\x8c0\xf9\xaa\x87q\t\xda\xca\nt\xc6F\x9a\xe4\xf5\x86\x97\xde\xe1\x12\x88\x01\xc1O\xd44=&\x8a\xa4|D\x00C\xa9z\xe1d/\xea\xcc@\xf2\x7f\"\'\xc5\'\xe1\x9a\xd1h.\xab', 0x0) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r2, {0x2, 0x0, @dev}, 0x2}}, 0x2e) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0xa}, 0x1c) r3 = socket$pppl2tp(0x18, 0x1, 0x1) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r3, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r4, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x2, 0x0, 0xfffffffc}}, 0x2e) r5 = socket$pppl2tp(0x18, 0x1, 0x1) r6 = socket$inet6_udp(0xa, 0x2, 0x0) r7 = shmget$private(0x0, 0x3000, 0x10, &(0x7f0000ffc000/0x3000)=nil) shmctl$IPC_INFO(r7, 0x3, &(0x7f0000000080)=""/167) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000200), &(0x7f0000000240)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000000100)={0x0, 0xff, 0x33, "402ba09189bc8c204c6f226e3289c175eb5a533e471bd2873a1d733488fc5d65bb5740ae8a5a68c940a563e6051745e8382829"}, 0x3b) ioctl$VIDIOC_G_JPEGCOMP(0xffffffffffffffff, 0x808c563d, &(0x7f0000000140)) connect$pppl2tp(r5, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r6, {0x2, 0x0, @dev}, 0x2}}, 0x2e) pwritev(r5, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) sendfile(r0, r0, 0x0, 0x40fdf) 20:34:08 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r4, r5, 0x0, 0x800009) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r6, r7, 0x0, 0x800009) ioctl$VIDIOC_S_EXT_CTRLS(r7, 0xc0205648, &(0x7f00000000c0)={0xa20000, 0xffffffff, 0xfa, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9c0903, 0x3, [], @value64=0x6}}) r9 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r10 = socket$nl_netfilter(0x10, 0x3, 0xc) r11 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r10, r11, 0x0, 0x800009) poll(&(0x7f0000000100)=[{0xffffffffffffffff, 0x402}, {r3, 0x10}, {r0, 0x12}, {r5, 0x3406}, {r8, 0x1000}, {r9, 0x204}, {r11, 0x8823}], 0x7, 0xfffff001) r12 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') bind$netlink(r12, &(0x7f0000000040)={0x10, 0x0, 0x25dfdbff, 0x4}, 0xc) sendfile(r1, r12, 0x0, 0x800009) 20:34:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000240)='./file0\x00', 0x4000000000, 0x1, &(0x7f0000002280)=[{&(0x7f0000000100)="800000003804000019000300e60100006c00fec9000000000100000001000000000700000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x804803, 0x0) 20:34:08 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x5, 0x0, 0x0, 0x0, 0x7e}, @mpls={[], @ipv4=@dccp={{0x5, 0x4, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x84, 0x0, @remote, @local}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00-\x00', 0x0, "070403"}, "ccbfc12abc282c27820fd9118600820e000500110000000094ce7f17e89fb5f1112b33df4c366b67856c210a24c3df6373d0ca47aac2885da778edbd1ee5bde967a600ca0e2ba1e34aebb68aa9431063000000000000000000010000"}}}}, 0x8a) 20:34:08 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x0) 20:34:08 executing program 5: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000000c0)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="c4860332", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) r2 = socket(0xa, 0x1, 0x0) close(r2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x7a, &(0x7f0000000240)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000180)=0x90) [ 1565.099260] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1565.173878] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 20:34:08 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x2) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) socket$unix(0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x3ec0) 20:34:08 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x35, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x43002, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x1) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) ioctl$SNDRV_PCM_IOCTL_REWIND(r3, 0x40084146, &(0x7f0000000040)=0x6) [ 1565.248593] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1565.319126] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1565.391847] EXT4-fs error (device loop3): ext4_fill_super:4437: inode #2: comm syz-executor.3: iget: root inode unallocated 20:34:08 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = msgget(0x2, 0x5aa) msgctl$IPC_INFO(r0, 0x3, &(0x7f0000000040)=""/194) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r1, r2, 0x0, 0x800009) 20:34:08 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) [ 1565.471701] EXT4-fs (loop3): get root inode failed [ 1565.505495] EXT4-fs (loop3): mount failed 20:34:08 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000040)=""/77, 0x4d) sendfile(r0, r1, 0x0, 0x800009) [ 1565.596196] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 1565.623433] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1565.684590] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1565.727649] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1565.766887] EXT4-fs: failed to create workqueue [ 1565.801784] EXT4-fs (loop3): mount failed 20:34:11 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:34:11 executing program 0: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000340)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}) 20:34:11 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000", @ANYRES16=r3, @ANYBLOB="05000000ac8dfc359150df6f0000"], 0x14}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="a5a4f852cb83b9b52de3938c259965720b8de17943886c2ac3ea5a8557e8614ab016487b4397a2d7e7b5b571e825a98a1e020c14afd8c2b60318586837f9a3861a2d343dea1606c6bbcb246f2f6adb802c27d6886254ddda2628a040deb23646d33781a572d3388c7885275903f0", @ANYRES16=r3, @ANYBLOB="04002dbd7000ffdbdf250300000008000200001000000500060040000000"], 0x24}, 0x1, 0x0, 0x0, 0xc0c5}, 0x8850) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r4, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="7400000001080101000000000000000002000006050003000600000006000240001900001400048008000740ffffbfec080004400000800106000240000c000006000240001a000006000240831400000500030088000000fdffffff080002400000000408000240000000020800024000000080"], 0x74}, 0x1, 0x0, 0x0, 0x41}, 0x800) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') r6 = socket$nl_netfilter(0x10, 0x3, 0xc) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r6, r7, 0x0, 0x800009) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(0xffffffffffffffff, r8, 0x0, 0x800009) ioctl$SNDRV_PCM_IOCTL_STATUS32(r8, 0x806c4120, &(0x7f0000000340)) setsockopt$SO_TIMESTAMP(r6, 0x1, 0x40, &(0x7f00000001c0)=0x6e49497f, 0x4) ioctl$FITHAW(r6, 0xc0045878) sendfile(r4, r5, 0x0, 0x800009) 20:34:11 executing program 3: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r0, 0xc08c5335, &(0x7f00000002c0)={0x80000001, 0x0, 0x0, 'queue0\x00', 0x8}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, &(0x7f0000000400)=0x6) r2 = semget$private(0x0, 0x1, 0x84) semctl$SEM_STAT_ANY(r2, 0x1, 0x14, &(0x7f0000000380)=""/73) openat$bsg(0xffffffffffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x40000, 0x0) rt_sigpending(&(0x7f00000001c0), 0x8) sendmsg$TIPC_NL_LINK_SET(r0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x4002) io_setup(0xb, &(0x7f0000000040)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x200a00}]) r4 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) dup(0xffffffffffffffff) readlink(&(0x7f0000000000)='./bus\x00', &(0x7f0000000140)=""/126, 0x7e) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r4, 0x0) 20:34:11 executing program 5: mkdir(&(0x7f00000004c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000080)='debugfs\x00', 0x0, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x112c86e, &(0x7f0000000040)=ANY=[@ANYBLOB="6d6f64653d30303030343030303030303015b807a8f1c03030302c6769643d", @ANYRESDEC=r0]) 20:34:11 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000240)) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000200)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f00000000c0)=""/19, 0x8) [ 1568.149522] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 20:34:11 executing program 2: 20:34:11 executing program 0: 20:34:11 executing program 5: [ 1568.275301] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 20:34:11 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:34:11 executing program 2: 20:34:11 executing program 1: perf_event_open(&(0x7f0000348f88)={0x5, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4802}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r4, r5, 0x0, 0x800009) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r5, 0x810c5701, &(0x7f0000000080)) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r6, r7, 0x0, 0x800009) ioctl$sock_inet_sctp_SIOCINQ(r7, 0x541b, &(0x7f0000000040)) sendfile(r0, r1, 0x0, 0x800009) 20:34:11 executing program 5: 20:34:11 executing program 0: [ 1568.540696] audit: type=1804 audit(5885210051.673:208): pid=29532 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir017937193/syzkaller.bZbNRC/1060/bus" dev="sda1" ino=17545 res=1 20:34:11 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 1568.730839] audit: type=1804 audit(5885210051.863:209): pid=29547 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir017937193/syzkaller.bZbNRC/1060/bus" dev="sda1" ino=17545 res=1 20:34:11 executing program 3: 20:34:11 executing program 5: 20:34:11 executing program 2: 20:34:11 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r1, r2, 0x0, 0x800009) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0xf8, r3, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x401}]}, @IPVS_CMD_ATTR_DAEMON={0x40, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @empty}}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_DAEMON={0x5c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6erspan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vlan1\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0xc}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x0, 0x12}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}]}, 0xf8}}, 0x84) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r4, 0x0, 0x800009) 20:34:11 executing program 0: 20:34:11 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 1568.872813] audit: type=1800 audit(5885210051.863:210): pid=29547 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="sda1" ino=17545 res=0 20:34:12 executing program 0: 20:34:12 executing program 5: 20:34:12 executing program 2: 20:34:12 executing program 0: 20:34:12 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000580)=@newqdisc={0x2c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_mq={0x7, 0x1, 'mq\x00'}]}, 0x2c}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x7ff, 0xfffffff9, 0x3, 0x408, r0, 0x81, [], r2, r0, 0x4, 0x2, 0x1}, 0x40) r4 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r4, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r4, 0x0) sendfile(r1, r4, 0x0, 0x7) 20:34:12 executing program 3: 20:34:12 executing program 5: 20:34:12 executing program 2: 20:34:12 executing program 3: 20:34:12 executing program 0: signalfd4(0xffffffffffffffff, &(0x7f0000000080), 0x8, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) sendfile(r1, r0, 0x0, 0x209) 20:34:12 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) sched_setattr(0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004a00)=[{{&(0x7f0000000c40)=@in6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f0000000e00)=[{0x0}], 0x1}, 0x9}, {{&(0x7f0000000ec0)=@tipc=@id, 0x80, 0x0, 0x0, &(0x7f0000002440)=""/79, 0x4f}}, {{&(0x7f00000024c0)=@l2tp={0x2, 0x0, @local}, 0x80, &(0x7f0000004780)=[{0x0}, {&(0x7f0000003780)=""/4096, 0x1000}], 0x2}, 0x10000}, {{&(0x7f0000004800)=@ipx, 0x80, &(0x7f0000004940)=[{0x0}], 0x1, &(0x7f0000004980)=""/75, 0x4b}, 0x7e}], 0x4, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) mprotect(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0) 20:34:15 executing program 2: r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000340)='./file1\x00', 0x0) mkdirat(r0, &(0x7f00000003c0)='./file0\x00', 0x0) unlinkat(0xffffffffffffffff, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x14, &(0x7f0000000000)=0x100000001, 0x4) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendto$inet(r1, &(0x7f0000000580)='\x00', 0x1, 0x0, 0x0, 0x2a) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x9, 0x80ffffffff, 0x800080}, 0x14) shutdown(r1, 0x1) 20:34:15 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') clone(0x1880100, &(0x7f0000000040)="74403a97edca654e64565c549f4d5220903d448ff9940f5083854c2de0eb0dfd30294308813a9f9c3c3d18326b9abc1b076a21ccdc8c5acac15853f706aef9c10f25d18e0e69219fe13f6c4e2f451f9e111730be49e78519a015a73098f35cee17a0e141409444f3721ad58d6f06db8d4639d055d36c3162062120a03027c3f8601de4e0a4b9cd34d9c7a7f4593541f5a6dc9befe3e4801138c80706f6b4a179aa2e177cefa09b8b877dee09a586619381e0471cbc8c91b270b0d0d6acff06512ddbf32dcb9c5ba6cd26a6e128ea12fc7f11ce1e4bf1c9d1174ca0b21f7dfe8ca77d6293ee28ac0c942e59c7b59d17acdd", &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="3b72ec10640908719ef4e88049fa1e5f4b") sendfile(r0, r1, 0x0, 0x800009) r2 = dup3(0xffffffffffffffff, r1, 0x80000) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001180)={0x14, r4, 0x917, 0x0, 0x0, {0x5}}, 0x14}}, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x30, r4, 0x8, 0x70bd2c, 0x25dfdbfb, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x9}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x61a}]}, 0x30}, 0x1, 0x0, 0x0, 0x800}, 0x4004084) 20:34:15 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x164142, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80001d00c0d0) 20:34:15 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:34:15 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) shutdown(r0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) 20:34:15 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000200)=ANY=[@ANYBLOB="030000000000000000000000000000000400000000000000f6ffffff00000000010000000000000000000000000000000000f2ffff0700000a000000", @ANYRESOCT]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) write$P9_RLOCK(0xffffffffffffffff, &(0x7f00000000c0)={0x8, 0x35, 0x0, 0x2}, 0x8) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0xf8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:34:15 executing program 5: r0 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto(r0, &(0x7f0000000040)="120000001200e7ef007b0000f4afd7030a7c", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000020c0), 0x3a4, 0x0, &(0x7f0000000000)={0x77359400}) 20:34:15 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) accept4$ax25(r1, 0x0, &(0x7f0000000040), 0x80000) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_sock_diag(0x10, 0x3, 0x4) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) [ 1572.058605] audit: type=1800 audit(5885210055.193:211): pid=29619 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=17746 res=0 20:34:15 executing program 2: perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') write$FUSE_BMAP(r0, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 20:34:15 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x80001, 0x0) getpeername$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000080)=0x14) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) [ 1572.203016] audit: type=1800 audit(5885210055.243:212): pid=29619 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=16300 res=0 20:34:15 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0x10132) recvmmsg(r1, &(0x7f00000006c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x12024, 0x0) 20:34:15 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r2, &(0x7f0000000080)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000001c0)=[{{0x0, 0xe8, 0x0}}, {{0x0, 0x2d, &(0x7f0000000100)=[{&(0x7f0000001300)=""/4125, 0x101d}], 0x1}}], 0x2, 0x0, 0x0) recvfrom$inet6(r2, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffbf) recvfrom$inet6(r2, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r3 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r3, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 20:34:15 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x1, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4f00000000000000, 0x7}, 0x0, 0x0, 0x20, 0xe, 0x0, 0x6dd}, 0x0, 0x0, r0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r1, r2, 0x0, 0x800009) 20:34:15 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snd/seq\x00', 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r2, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"a357b6b140cbb6215dd33459"}}], 0xfffffee4) 20:34:15 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000280)={{{@in, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2f}}, {{@in=@loopback, 0x0, 0x6c}, 0x0, @in=@broadcast}}, 0xe8) bind$inet6(r0, &(0x7f0000f13000)={0xa, 0x4e22}, 0x1c) syz_emit_ethernet(0x2e, &(0x7f00000000c0)={@link_local, @dev, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x11, 0x0, @rand_addr, @broadcast}, {0x0, 0x4e22, 0xc, 0x0, @gue={{0x1, 0x0, 0x0, 0x0, 0x0, @void}}}}}}}, 0x0) [ 1572.497870] netlink: 41479 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1572.650318] netlink: 15719 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1572.681898] A link change request failed with some changes committed already. Interface ip6_vti0 may have been left with an inconsistent configuration, please check. 20:34:18 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:34:18 executing program 2: perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') write$FUSE_BMAP(r0, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 20:34:18 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet(0x2, 0x80000, 0x1) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) 20:34:18 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000080)='debugfs\x00', 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x112c86e, &(0x7f0000000100)=ANY=[@ANYBLOB="6d6f64653d30303030343030303030303015b807a8f1c03030302c6769643d"]) 20:34:18 executing program 5: sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000840)=ANY=[@ANYBLOB="0209000002"], 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffa0018000, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x2, 0x6, 0x0, 0x0, 0x2, 0x0, 0x70bd2d}, 0x10}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x32bc45944b084a6, 0x0) 20:34:18 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) 20:34:18 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) 20:34:18 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snd/seq\x00', 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"a357b6b140cbb6215dd33459"}}], 0xfffffee4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x4000000000005e3, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 20:34:18 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:34:18 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(r0, &(0x7f00000092c0), 0xa6, 0x0) 20:34:18 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) 20:34:18 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) 20:34:18 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) io_setup(0x202, &(0x7f00000004c0)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f00000002c0)={0x4, 0x6d, 0x1, 0x0, 0x2, [{}, {}]}) 20:34:18 executing program 2: perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') write$FUSE_BMAP(r0, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 20:34:18 executing program 1: r0 = getpid() socket$nl_route(0x10, 0x3, 0x0) sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) perf_event_open(&(0x7f0000348f88)={0x1, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x9c}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1}, r0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r1, r2, 0x0, 0x800009) inotify_init1(0x800) sendmsg$AUDIT_TTY_GET(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x19fec8b3464e25b4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x10, 0x3f8, 0x100, 0x70bd2c, 0x25dfdbfb, "", ["", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x800}, 0xc4) 20:34:18 executing program 0: capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000240)) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000005bc0)=""/66) 20:34:18 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000f13000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x8}, 0x1c) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @dev, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @rand_addr, @multicast1}, {0x0, 0x4e22, 0x8}}}}}, 0x0) 20:34:18 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x1000) 20:34:18 executing program 0: clone(0x82000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x240, 0x0, 0x0, 0x148, 0x118, 0x0, 0x1a8, 0x2a8, 0x2a8, 0x1a8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0xe0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@unspec=@ipvs={{0x48, 'ipvs\x00'}, {@ipv6=@empty}}]}, @common=@inet=@SET3={0x38, 'SET\x00'}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2a0) 20:34:18 executing program 2: perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') write$FUSE_BMAP(r0, 0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) [ 1575.871430] Cannot find add_set index 0 as target 20:34:21 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:34:21 executing program 5: 20:34:21 executing program 0: 20:34:21 executing program 3: 20:34:21 executing program 2: perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 20:34:21 executing program 1: perf_event_open(&(0x7f0000348f88)={0x5, 0x70, 0xe3, 0xa3, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2000, 0x0, 0x8, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r1, r2, 0x0, 0x800009) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f0000000580)={0x5, 0x10, 0xfa00, {0x0, r4}}, 0x18) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r4}}, 0x18) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r0, 0x0, 0x5) 20:34:21 executing program 3: 20:34:21 executing program 5: 20:34:21 executing program 0: 20:34:21 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r1, 0x3) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r3, r4, 0x0, 0x800009) ioctl$KDGETMODE(r4, 0x4b3b, &(0x7f0000000040)) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r5, r6, 0x0, 0x800009) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) ioctl$SIOCAX25ADDUID(r1, 0x89e1, &(0x7f0000000140)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, r7}) truncate(&(0x7f0000000080)='./file0\x00', 0x1) sendfile(r2, 0xffffffffffffffff, 0x0, 0x800009) 20:34:21 executing program 5: 20:34:21 executing program 0: 20:34:24 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:34:24 executing program 3: 20:34:24 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x9, 0x0, 0x0, 0x9, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000080)={'nat\x00', 0x0, 0x0, 0x0, [], 0x4, &(0x7f0000000040)=[{}], 0x0, [{}, {}, {}, {}]}, 0xb8) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r2, 0x0, 0x800009) 20:34:24 executing program 2: perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 20:34:24 executing program 5: 20:34:24 executing program 0: 20:34:24 executing program 5: 20:34:24 executing program 3: r0 = syz_open_procfs(0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) r1 = gettid() r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r1) write$binfmt_script(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="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"/419], 0x194) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0x3f}, 0x16, 0x0) close(r2) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000340)=@v2, 0x14, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) 20:34:24 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) syz_open_dev$tty1(0xc, 0x4, 0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') write$tun(r2, 0x0, 0x0) 20:34:24 executing program 2: perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 20:34:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in=@multicast2, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x32}}, {{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x6c}, 0x0, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}, 0xe8) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @empty, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "000400", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 20:34:24 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000280)) 20:34:27 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ipip={{0x9, 0x1, 'ipip\x00'}, {0x73, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x8, 0x2, @private}, @IFLA_IPTUN_ENCAP_TYPE={0x6}]}}}, @IFLA_MASTER={0x8}]}, 0x4c}}, 0x0) 20:34:27 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:34:27 executing program 2: perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 20:34:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r1, r0, 0x0, 0x0) bind$rose(r0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000140)=0x31, 0x4) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x17}}, 0x10) connect$inet(r2, &(0x7f0000000500)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r2, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 20:34:27 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r5 = socket(0x29, 0x0, 0xfffffffe) sendmsg$nl_route_sched(r5, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000580)=@newqdisc={0x2c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_mq={0x7, 0x1, 'mq\x00'}]}, 0x2c}}, 0x0) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r8 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000580)=@newqdisc={0x2c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_mq={0x7, 0x1, 'mq\x00'}]}, 0x2c}}, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)={0x178, 0x0, 0x200, 0x70bd28, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKMODES_OURS={0x54, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x46, 0x5, "6fdcc13fdac3e70ff2dc0fe09c13f9e5b56f31b040ce3f55cc6f49cf8a57910918aa8bf51cef7bd2483e7755ffe33c00b18c13b233879379680b02742090b8da4216"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x3f}]}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x5}, @ETHTOOL_A_LINKMODES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x4}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x4}, @ETHTOOL_A_LINKMODES_HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x9}, @ETHTOOL_A_LINKMODES_HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x1}, @ETHTOOL_A_LINKMODES_HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}]}]}, 0x178}, 0x1, 0x0, 0x0, 0xc0}, 0x800) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r9, 0x0, 0x800009) [ 1584.511819] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 20:34:27 executing program 3: r0 = socket(0x1e, 0x5, 0x0) connect$tipc(r0, &(0x7f00000000c0)=@id, 0x10) recvmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000600)=""/123, 0x7b}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000700)={&(0x7f0000000100)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000280)=""/144, 0x90}], 0x1, &(0x7f0000000940)=""/223, 0xdf}, 0x0) 20:34:27 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 20:34:27 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000080)='debugfs\x00', 0x0, 0x0) r0 = getpid() syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x112c86e, &(0x7f0000000100)=ANY=[@ANYBLOB="6d6f64653d30303030343030303030303015b807a8f1c03030302c6769643d", @ANYRESHEX=r0]) 20:34:27 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x90, 0xe3, 0x0, 0x5, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2674}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) sendmsg$AUDIT_TRIM(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x10, 0x3f6, 0x20, 0x70bd2c, 0x25dfdbfb, "", ["", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x40000}, 0x800) socket$pptp(0x18, 0x1, 0x2) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') bind$bt_l2cap(r1, &(0x7f0000000180)={0x1f, 0x7f, @none, 0xfff}, 0xe) sendfile(r2, r3, 0x0, 0x800009) ioctl$PPPIOCGMRU(r3, 0x80047453, &(0x7f0000000040)) mmap$binder(&(0x7f0000fee000/0xf000)=nil, 0xf000, 0x1, 0x11, r3, 0x3ff) 20:34:27 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 20:34:28 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) r1 = dup(r0) bind$tipc(r1, &(0x7f00000000c0)=@name, 0x10) 20:34:28 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$kcm(0x29, 0x0, 0x0) 20:34:28 executing program 1: perf_event_open(&(0x7f0000348f88)={0x3, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r1, r2, 0x0, 0x800009) getdents64(r2, &(0x7f0000000040)=""/222, 0xde) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r3, 0x0, 0x800009) 20:34:30 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:34:30 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 20:34:30 executing program 3: syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f0000001280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 20:34:30 executing program 5: r0 = epoll_create1(0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) unshare(0x2a000400) epoll_pwait(r0, &(0x7f0000000000)=[{}], 0x1, 0x0, 0x0, 0x0) 20:34:30 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000000080)={0x2, 0x0, [{0x80000000, 0x3ff, 0x5, 0xfff, 0x7fff}, {0x6, 0x26547427, 0x9, 0x6, 0x1000}]}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r1, r2, 0x0, 0x800009) 20:34:30 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) r1 = dup(r0) ioctl$USBDEVFS_RESETEP(r1, 0x80045515, &(0x7f0000000440)={0x1, 0x1}) 20:34:30 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendto$l2tp6(r0, &(0x7f0000000580)='E', 0x1, 0x814, &(0x7f00000004c0)={0xa, 0x0, 0x0, @local}, 0x20) 20:34:30 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) [ 1587.612788] usb usb2: usbfs: process 30167 (syz-executor.0) did not claim interface 0 before use 20:34:30 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:34:30 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f0000000100)={0xe, @pix={0x9, 0x7f, 0x56595559, 0x0, 0x7ff, 0x100, 0x5, 0x9, 0x0, 0x8, 0x1}}) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r1, r2, 0x0, 0x800009) ioctl$FBIOGET_VSCREENINFO(r2, 0x4600, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x7) [ 1587.674746] usb usb2: usbfs: process 30176 (syz-executor.0) did not claim interface 0 before use 20:34:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$NFULNL_MSG_CONFIG(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, 0x1, 0x4, 0x5, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x4}]}, 0x1c}}, 0x0) 20:34:30 executing program 3: socket(0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000040)={'syz', 0x1}, &(0x7f00000001c0)="c6428d6c7059fabfbf86f20a9dc4af4a6f31462463b14c932fb089c61d0d54ca", 0x20, 0xfffffffffffffffa) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)='\x00', 0x1, r1) r3 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r0, r3}, &(0x7f0000000440)=""/243, 0x23d, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) add_key$user(&(0x7f00000000c0)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) 20:34:30 executing program 5: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) 20:34:30 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 20:34:31 executing program 1: r0 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000cab000)) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f0000000100)=""/180, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) r2 = dup(r1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$USBDEVFS_RESETEP(r2, 0x80045515, &(0x7f0000000440)={0x1, 0x1}) 20:34:31 executing program 0: 20:34:31 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 20:34:31 executing program 5: [ 1588.018226] usb usb2: usbfs: process 30204 (syz-executor.1) did not claim interface 0 before use 20:34:31 executing program 3: 20:34:31 executing program 0: [ 1588.093551] usb usb2: usbfs: process 30211 (syz-executor.1) did not claim interface 0 before use 20:34:33 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:34:33 executing program 1: 20:34:33 executing program 2: perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 20:34:33 executing program 5: 20:34:33 executing program 0: 20:34:33 executing program 3: 20:34:34 executing program 3: 20:34:34 executing program 5: 20:34:34 executing program 1: 20:34:34 executing program 2: perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 20:34:34 executing program 0: 20:34:34 executing program 3: 20:34:36 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:34:36 executing program 0: 20:34:36 executing program 5: 20:34:36 executing program 1: 20:34:36 executing program 2: perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 20:34:36 executing program 3: 20:34:37 executing program 1: 20:34:37 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000680)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa0\x16\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2O\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc0\xdc\x14\xeb\f\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xf7v\x87\xbb\xaf\xaa\xf8\xd68\x813a/\xc41\xae\x14\"\x85\x99\x97\xed\xec\x13\x8a\xe2E\xab/\xd4TE\f\xe9<\".\xc6\xbcK\xf8T=6\'\x05u\x8f\x01\xb8\xce{\x9d\xb0\xee\x1e\x89\x13Ze\xa5\xf4\x16\x93\xaa\x19V\x10\x11?\x82|\x11#\x015\x836>x\x06\xbd7S\x9c!\xee\xf6\xa4\x9aqf\xe7-+(m\xaf\x1f\x8dzqW\b\xa5x\xf1r\xf1\xc6u\x8d\xd1@\xf2\xb0\x93\x98f)\x1e)K\x81\x90n\x9c\xcf5\xb9\xbc\x14\xd84/\x9c8[/\x99k\xa5\x9fc0j\xc1!\xec\xe2\xba\x1f\x8c\xe4\x1a\x83\x1b\x84> 5Ib\x8c\x8e`\x92\xcbc\xd5\x18\x80x\x15\xa5\x84\x1e\xd4\x86\x19\x1a\xbcU\xf4Da\xbaP\xa8\x8c0\xf9\xaa\x87q\t\xda\xca\nt\xc6F\x9a\xe4\xf5\x86\x97\xde\xe1\x12\x88\x01\xc1O\xd44=&\x8a\xa4|D\x00C\xa9z\xe1d/\xea\xcc@\xf2\x7f\"\'\xc5\'\xe1\x9a\xd1h.\xab', 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r3) sendfile(r0, 0xffffffffffffffff, 0x0, 0x40fdf) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) 20:34:37 executing program 2: perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 20:34:37 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) ftruncate(r0, 0x40) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r1, 0x6, 0x14, 0x0, &(0x7f0000000100)) 20:34:37 executing program 3: r0 = socket(0x1e, 0x5, 0x0) connect$tipc(r0, &(0x7f00000000c0)=@id, 0x10) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x0) 20:34:37 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:34:37 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r0, 0x0, 0x1, 0x0, 0x0}, 0x20) 20:34:37 executing program 2: perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 20:34:37 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) ftruncate(r0, 0x40) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r1, 0x6, 0x1a, 0x0, &(0x7f0000000100)) 20:34:37 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$fou(0x0) 20:34:37 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000680)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa0\x16\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2O\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc0\xdc\x14\xeb\f\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xf7v\x87\xbb\xaf\xaa\xf8\xd68\x813a/\xc41\xae\x14\"\x85\x99\x97\xed\xec\x13\x8a\xe2E\xab/\xd4TE\f\xe9<\".\xc6\xbcK\xf8T=6\'\x05u\x8f\x01\xb8\xce{\x9d\xb0\xee\x1e\x89\x13Ze\xa5\xf4\x16\x93\xaa\x19V\x10\x11?\x82|\x11#\x015\x836>x\x06\xbd7S\x9c!\xee\xf6\xa4\x9aqf\xe7-+(m\xaf\x1f\x8dzqW\b\xa5x\xf1r\xf1\xc6u\x8d\xd1@\xf2\xb0\x93\x98f)\x1e)K\x81\x90n\x9c\xcf5\xb9\xbc\x14\xd84/\x9c8[/\x99k\xa5\x9fc0j\xc1!\xec\xe2\xba\x1f\x8c\xe4\x1a\x83\x1b\x84> 5Ib\x8c\x8e`\x92\xcbc\xd5\x18\x80x\x15\xa5\x84\x1e\xd4\x86\x19\x1a\xbcU\xf4Da\xbaP\xa8\x8c0\xf9\xaa\x87q\t\xda\xca\nt\xc6F\x9a\xe4\xf5\x86\x97\xde\xe1\x12\x88\x01\xc1O\xd44=&\x8a\xa4|D\x00C\xa9z\xe1d/\xea\xcc@\xf2\x7f\"\'\xc5\'\xe1\x9a\xd1h.\xab', 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r3) sendfile(r0, 0xffffffffffffffff, 0x0, 0x40fdf) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) 20:34:37 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:34:37 executing program 2: perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 20:34:37 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) ftruncate(r0, 0x40) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r1, 0x6, 0xc, 0x0, &(0x7f0000000100)) 20:34:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x278, 0x4c000008, 0x1e0, 0x108, 0x50, 0x108, 0x278, 0x1e0, 0x1e0, 0x1e0, 0x1e0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0xa2], 0x0, 0xd8, 0x108, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}, {{@ip={@multicast1, @local, 0x0, 0x0, 'vcan0\x00', 'veth0_to_bridge\x00'}, 0x0, 0x70, 0xd8, 0x0, {0xe001000000000000}}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2d8) rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) 20:34:37 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000680)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa0\x16\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2O\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc0\xdc\x14\xeb\f\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xf7v\x87\xbb\xaf\xaa\xf8\xd68\x813a/\xc41\xae\x14\"\x85\x99\x97\xed\xec\x13\x8a\xe2E\xab/\xd4TE\f\xe9<\".\xc6\xbcK\xf8T=6\'\x05u\x8f\x01\xb8\xce{\x9d\xb0\xee\x1e\x89\x13Ze\xa5\xf4\x16\x93\xaa\x19V\x10\x11?\x82|\x11#\x015\x836>x\x06\xbd7S\x9c!\xee\xf6\xa4\x9aqf\xe7-+(m\xaf\x1f\x8dzqW\b\xa5x\xf1r\xf1\xc6u\x8d\xd1@\xf2\xb0\x93\x98f)\x1e)K\x81\x90n\x9c\xcf5\xb9\xbc\x14\xd84/\x9c8[/\x99k\xa5\x9fc0j\xc1!\xec\xe2\xba\x1f\x8c\xe4\x1a\x83\x1b\x84> 5Ib\x8c\x8e`\x92\xcbc\xd5\x18\x80x\x15\xa5\x84\x1e\xd4\x86\x19\x1a\xbcU\xf4Da\xbaP\xa8\x8c0\xf9\xaa\x87q\t\xda\xca\nt\xc6F\x9a\xe4\xf5\x86\x97\xde\xe1\x12\x88\x01\xc1O\xd44=&\x8a\xa4|D\x00C\xa9z\xe1d/\xea\xcc@\xf2\x7f\"\'\xc5\'\xe1\x9a\xd1h.\xab', 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r3) sendfile(r0, 0xffffffffffffffff, 0x0, 0x40fdf) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) 20:34:37 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) ftruncate(r0, 0x40) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r1, 0x6, 0x25, 0x0, &(0x7f0000000100)) 20:34:37 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket(0x30002000000010, 0x1000000003, 0x0) write(r1, &(0x7f0000000080)="fc00000015000700ab092500090007000aabf6ff0100600004007693210001", 0x1f) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 20:34:37 executing program 0: setrlimit(0x7, &(0x7f0000000000)={0x0, 0x7fffffff}) 20:34:37 executing program 2: perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) [ 1594.513056] xt_CT: You must specify a L4 protocol and not use inversions on it [ 1594.533711] x_tables: ip_tables: CT target: only valid in raw table, not 20:34:37 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="0b00000073797a3119000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100738d7a310000000000ff07000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000cf0a00000000000000000c000000000000000000000000000000000000000000000000000000000016"], 0x12e) write$UHID_DESTROY(r2, &(0x7f0000000040), 0x4) 20:34:37 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000680)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa0\x16\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2O\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc0\xdc\x14\xeb\f\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xf7v\x87\xbb\xaf\xaa\xf8\xd68\x813a/\xc41\xae\x14\"\x85\x99\x97\xed\xec\x13\x8a\xe2E\xab/\xd4TE\f\xe9<\".\xc6\xbcK\xf8T=6\'\x05u\x8f\x01\xb8\xce{\x9d\xb0\xee\x1e\x89\x13Ze\xa5\xf4\x16\x93\xaa\x19V\x10\x11?\x82|\x11#\x015\x836>x\x06\xbd7S\x9c!\xee\xf6\xa4\x9aqf\xe7-+(m\xaf\x1f\x8dzqW\b\xa5x\xf1r\xf1\xc6u\x8d\xd1@\xf2\xb0\x93\x98f)\x1e)K\x81\x90n\x9c\xcf5\xb9\xbc\x14\xd84/\x9c8[/\x99k\xa5\x9fc0j\xc1!\xec\xe2\xba\x1f\x8c\xe4\x1a\x83\x1b\x84> 5Ib\x8c\x8e`\x92\xcbc\xd5\x18\x80x\x15\xa5\x84\x1e\xd4\x86\x19\x1a\xbcU\xf4Da\xbaP\xa8\x8c0\xf9\xaa\x87q\t\xda\xca\nt\xc6F\x9a\xe4\xf5\x86\x97\xde\xe1\x12\x88\x01\xc1O\xd44=&\x8a\xa4|D\x00C\xa9z\xe1d/\xea\xcc@\xf2\x7f\"\'\xc5\'\xe1\x9a\xd1h.\xab', 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r3) sendfile(r0, 0xffffffffffffffff, 0x0, 0x40fdf) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) 20:34:37 executing program 0: socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x3f) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYBLOB="3800000010000507000200"/20, @ANYRES32=r2, @ANYBLOB="00000016010000001800120008000100736974000c00020008000300", @ANYRES32], 0x38}}, 0x0) [ 1594.759473] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1594.762663] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1594.769069] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1594.791359] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1594.803497] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1594.822933] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1594.834333] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1594.878928] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1594.903557] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1594.913790] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1594.923563] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1594.935568] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1594.942358] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1594.955722] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1594.962516] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1594.970103] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1594.992996] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1595.011027] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1595.029049] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1595.048360] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1595.072014] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1595.080475] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1595.088423] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1595.112910] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on sz1 [ 1595.156995] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 1595.163731] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 1595.205308] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 1595.212128] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 1595.235684] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 1595.242411] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 1595.275270] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 1595.282002] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 1595.305847] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 1595.312588] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 1595.345315] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 1595.360507] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 1595.381362] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 1595.415562] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 1595.422326] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 1595.436705] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 1595.443432] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 1595.451556] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 1595.473187] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 1595.481994] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 1595.491671] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 1595.498889] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 1595.516875] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz1] on sz1 20:34:40 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:34:40 executing program 2: perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 20:34:40 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000680)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa0\x16\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2O\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc0\xdc\x14\xeb\f\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xf7v\x87\xbb\xaf\xaa\xf8\xd68\x813a/\xc41\xae\x14\"\x85\x99\x97\xed\xec\x13\x8a\xe2E\xab/\xd4TE\f\xe9<\".\xc6\xbcK\xf8T=6\'\x05u\x8f\x01\xb8\xce{\x9d\xb0\xee\x1e\x89\x13Ze\xa5\xf4\x16\x93\xaa\x19V\x10\x11?\x82|\x11#\x015\x836>x\x06\xbd7S\x9c!\xee\xf6\xa4\x9aqf\xe7-+(m\xaf\x1f\x8dzqW\b\xa5x\xf1r\xf1\xc6u\x8d\xd1@\xf2\xb0\x93\x98f)\x1e)K\x81\x90n\x9c\xcf5\xb9\xbc\x14\xd84/\x9c8[/\x99k\xa5\x9fc0j\xc1!\xec\xe2\xba\x1f\x8c\xe4\x1a\x83\x1b\x84> 5Ib\x8c\x8e`\x92\xcbc\xd5\x18\x80x\x15\xa5\x84\x1e\xd4\x86\x19\x1a\xbcU\xf4Da\xbaP\xa8\x8c0\xf9\xaa\x87q\t\xda\xca\nt\xc6F\x9a\xe4\xf5\x86\x97\xde\xe1\x12\x88\x01\xc1O\xd44=&\x8a\xa4|D\x00C\xa9z\xe1d/\xea\xcc@\xf2\x7f\"\'\xc5\'\xe1\x9a\xd1h.\xab', 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r3) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) 20:34:40 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000040)='tmpfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@size={'size', 0x3d, [0x6b]}}]}) 20:34:40 executing program 1: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r2, 0x1, &(0x7f0000000340)=[&(0x7f00000000c0)={0x1100, 0x0, 0x10, 0x1, 0x0, r0, 0x0}]) 20:34:40 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) ftruncate(r0, 0x40) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r1, 0x6, 0x5, 0x0, &(0x7f0000000100)) [ 1597.387367] audit: type=1804 audit(5885210080.523:213): pid=30556 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir805115724/syzkaller.8SLBbU/1132/bus" dev="sda1" ino=17084 res=1 20:34:40 executing program 2: perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 20:34:40 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) ftruncate(r0, 0x40) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r1, 0x6, 0x11, 0x0, &(0x7f0000000100)) [ 1597.464676] audit: type=1804 audit(5885210080.553:214): pid=30556 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir805115724/syzkaller.8SLBbU/1132/bus" dev="sda1" ino=17084 res=1 20:34:40 executing program 0: timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x2817e, 0x0) flock(r1, 0x1) r2 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) flock(r2, 0x2) dup2(r1, r2) 20:34:40 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000680)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa0\x16\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2O\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc0\xdc\x14\xeb\f\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xf7v\x87\xbb\xaf\xaa\xf8\xd68\x813a/\xc41\xae\x14\"\x85\x99\x97\xed\xec\x13\x8a\xe2E\xab/\xd4TE\f\xe9<\".\xc6\xbcK\xf8T=6\'\x05u\x8f\x01\xb8\xce{\x9d\xb0\xee\x1e\x89\x13Ze\xa5\xf4\x16\x93\xaa\x19V\x10\x11?\x82|\x11#\x015\x836>x\x06\xbd7S\x9c!\xee\xf6\xa4\x9aqf\xe7-+(m\xaf\x1f\x8dzqW\b\xa5x\xf1r\xf1\xc6u\x8d\xd1@\xf2\xb0\x93\x98f)\x1e)K\x81\x90n\x9c\xcf5\xb9\xbc\x14\xd84/\x9c8[/\x99k\xa5\x9fc0j\xc1!\xec\xe2\xba\x1f\x8c\xe4\x1a\x83\x1b\x84> 5Ib\x8c\x8e`\x92\xcbc\xd5\x18\x80x\x15\xa5\x84\x1e\xd4\x86\x19\x1a\xbcU\xf4Da\xbaP\xa8\x8c0\xf9\xaa\x87q\t\xda\xca\nt\xc6F\x9a\xe4\xf5\x86\x97\xde\xe1\x12\x88\x01\xc1O\xd44=&\x8a\xa4|D\x00C\xa9z\xe1d/\xea\xcc@\xf2\x7f\"\'\xc5\'\xe1\x9a\xd1h.\xab', 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) 20:34:40 executing program 1: 20:34:40 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:34:40 executing program 1: 20:34:40 executing program 3: 20:34:40 executing program 2: perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) [ 1597.713992] audit: type=1804 audit(5885210080.843:215): pid=30587 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir159394186/syzkaller.vgNMJB/1346/file0" dev="sda1" ino=17050 res=1 20:34:40 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:34:40 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000680)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa0\x16\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2O\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc0\xdc\x14\xeb\f\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xf7v\x87\xbb\xaf\xaa\xf8\xd68\x813a/\xc41\xae\x14\"\x85\x99\x97\xed\xec\x13\x8a\xe2E\xab/\xd4TE\f\xe9<\".\xc6\xbcK\xf8T=6\'\x05u\x8f\x01\xb8\xce{\x9d\xb0\xee\x1e\x89\x13Ze\xa5\xf4\x16\x93\xaa\x19V\x10\x11?\x82|\x11#\x015\x836>x\x06\xbd7S\x9c!\xee\xf6\xa4\x9aqf\xe7-+(m\xaf\x1f\x8dzqW\b\xa5x\xf1r\xf1\xc6u\x8d\xd1@\xf2\xb0\x93\x98f)\x1e)K\x81\x90n\x9c\xcf5\xb9\xbc\x14\xd84/\x9c8[/\x99k\xa5\x9fc0j\xc1!\xec\xe2\xba\x1f\x8c\xe4\x1a\x83\x1b\x84> 5Ib\x8c\x8e`\x92\xcbc\xd5\x18\x80x\x15\xa5\x84\x1e\xd4\x86\x19\x1a\xbcU\xf4Da\xbaP\xa8\x8c0\xf9\xaa\x87q\t\xda\xca\nt\xc6F\x9a\xe4\xf5\x86\x97\xde\xe1\x12\x88\x01\xc1O\xd44=&\x8a\xa4|D\x00C\xa9z\xe1d/\xea\xcc@\xf2\x7f\"\'\xc5\'\xe1\x9a\xd1h.\xab', 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) 20:34:41 executing program 0: 20:34:41 executing program 1: 20:34:41 executing program 2: perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 20:34:41 executing program 3: 20:34:41 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 1597.887429] audit: type=1804 audit(5885210080.903:216): pid=30591 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir159394186/syzkaller.vgNMJB/1346/file0" dev="sda1" ino=17050 res=1 20:34:41 executing program 3: 20:34:41 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000680)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa0\x16\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2O\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc0\xdc\x14\xeb\f\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xf7v\x87\xbb\xaf\xaa\xf8\xd68\x813a/\xc41\xae\x14\"\x85\x99\x97\xed\xec\x13\x8a\xe2E\xab/\xd4TE\f\xe9<\".\xc6\xbcK\xf8T=6\'\x05u\x8f\x01\xb8\xce{\x9d\xb0\xee\x1e\x89\x13Ze\xa5\xf4\x16\x93\xaa\x19V\x10\x11?\x82|\x11#\x015\x836>x\x06\xbd7S\x9c!\xee\xf6\xa4\x9aqf\xe7-+(m\xaf\x1f\x8dzqW\b\xa5x\xf1r\xf1\xc6u\x8d\xd1@\xf2\xb0\x93\x98f)\x1e)K\x81\x90n\x9c\xcf5\xb9\xbc\x14\xd84/\x9c8[/\x99k\xa5\x9fc0j\xc1!\xec\xe2\xba\x1f\x8c\xe4\x1a\x83\x1b\x84> 5Ib\x8c\x8e`\x92\xcbc\xd5\x18\x80x\x15\xa5\x84\x1e\xd4\x86\x19\x1a\xbcU\xf4Da\xbaP\xa8\x8c0\xf9\xaa\x87q\t\xda\xca\nt\xc6F\x9a\xe4\xf5\x86\x97\xde\xe1\x12\x88\x01\xc1O\xd44=&\x8a\xa4|D\x00C\xa9z\xe1d/\xea\xcc@\xf2\x7f\"\'\xc5\'\xe1\x9a\xd1h.\xab', 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) 20:34:41 executing program 0: 20:34:41 executing program 1: 20:34:41 executing program 2: perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 20:34:41 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:34:41 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000680)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa0\x16\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2O\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc0\xdc\x14\xeb\f\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xf7v\x87\xbb\xaf\xaa\xf8\xd68\x813a/\xc41\xae\x14\"\x85\x99\x97\xed\xec\x13\x8a\xe2E\xab/\xd4TE\f\xe9<\".\xc6\xbcK\xf8T=6\'\x05u\x8f\x01\xb8\xce{\x9d\xb0\xee\x1e\x89\x13Ze\xa5\xf4\x16\x93\xaa\x19V\x10\x11?\x82|\x11#\x015\x836>x\x06\xbd7S\x9c!\xee\xf6\xa4\x9aqf\xe7-+(m\xaf\x1f\x8dzqW\b\xa5x\xf1r\xf1\xc6u\x8d\xd1@\xf2\xb0\x93\x98f)\x1e)K\x81\x90n\x9c\xcf5\xb9\xbc\x14\xd84/\x9c8[/\x99k\xa5\x9fc0j\xc1!\xec\xe2\xba\x1f\x8c\xe4\x1a\x83\x1b\x84> 5Ib\x8c\x8e`\x92\xcbc\xd5\x18\x80x\x15\xa5\x84\x1e\xd4\x86\x19\x1a\xbcU\xf4Da\xbaP\xa8\x8c0\xf9\xaa\x87q\t\xda\xca\nt\xc6F\x9a\xe4\xf5\x86\x97\xde\xe1\x12\x88\x01\xc1O\xd44=&\x8a\xa4|D\x00C\xa9z\xe1d/\xea\xcc@\xf2\x7f\"\'\xc5\'\xe1\x9a\xd1h.\xab', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r3) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) 20:34:41 executing program 3: 20:34:41 executing program 0: 20:34:41 executing program 1: 20:34:41 executing program 2: perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, 0x0, 0x0, 0x6c00000000000000) 20:34:41 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) 20:34:41 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:34:41 executing program 0: 20:34:41 executing program 3: 20:34:41 executing program 1: 20:34:41 executing program 2: perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, 0x0, 0x0, 0x6c00000000000000) 20:34:41 executing program 3: 20:34:41 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) 20:34:41 executing program 1: 20:34:41 executing program 0: 20:34:41 executing program 2: perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, 0x0, 0x0, 0x6c00000000000000) 20:34:41 executing program 3: 20:34:41 executing program 0: 20:34:44 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:34:44 executing program 2: perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 20:34:44 executing program 1: 20:34:44 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) 20:34:44 executing program 0: 20:34:44 executing program 3: 20:34:44 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) r2 = memfd_create(&(0x7f0000000680)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa0\x16\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2O\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc0\xdc\x14\xeb\f\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xf7v\x87\xbb\xaf\xaa\xf8\xd68\x813a/\xc41\xae\x14\"\x85\x99\x97\xed\xec\x13\x8a\xe2E\xab/\xd4TE\f\xe9<\".\xc6\xbcK\xf8T=6\'\x05u\x8f\x01\xb8\xce{\x9d\xb0\xee\x1e\x89\x13Ze\xa5\xf4\x16\x93\xaa\x19V\x10\x11?\x82|\x11#\x015\x836>x\x06\xbd7S\x9c!\xee\xf6\xa4\x9aqf\xe7-+(m\xaf\x1f\x8dzqW\b\xa5x\xf1r\xf1\xc6u\x8d\xd1@\xf2\xb0\x93\x98f)\x1e)K\x81\x90n\x9c\xcf5\xb9\xbc\x14\xd84/\x9c8[/\x99k\xa5\x9fc0j\xc1!\xec\xe2\xba\x1f\x8c\xe4\x1a\x83\x1b\x84> 5Ib\x8c\x8e`\x92\xcbc\xd5\x18\x80x\x15\xa5\x84\x1e\xd4\x86\x19\x1a\xbcU\xf4Da\xbaP\xa8\x8c0\xf9\xaa\x87q\t\xda\xca\nt\xc6F\x9a\xe4\xf5\x86\x97\xde\xe1\x12\x88\x01\xc1O\xd44=&\x8a\xa4|D\x00C\xa9z\xe1d/\xea\xcc@\xf2\x7f\"\'\xc5\'\xe1\x9a\xd1h.\xab', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) 20:34:44 executing program 1: 20:34:44 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800200203804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) mlockall(0x1) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, 0x0, 0x0) listxattr(0x0, 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xa4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x0) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000700)=ANY=[@ANYBLOB="62747266732ec4656375726974796c003e1487b52c98cfb51f27bd006f48679716d6473af25af8af7a9b82ad8f43000017bb3f2d88a886b79513c25de07962bc0e447b79f4c7f319d148030ad62c0e84f94cf084cdb41f63f5b452ceb396af9dbbbe154e8187681687b60abd75343f40ab0ebad7436fff26d5328c0b8ef96b669ad423a1781470025ce3860f964eaeb64f3ef3a6bf4a4e2d49810577c3a3de8ec6dcdf0d2d24637e70e6337de5"], &(0x7f0000000640)=""/156, 0x9c) dup2(r0, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) 20:34:44 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800200203804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) mlockall(0x1) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xa4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x0) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000700)=ANY=[@ANYBLOB="62747266732ec4656375726974796c003e1487b52c98cfb51f27bd006f48679716d6473af25af8af7a9b82ad8f43000017bb3f2d88a886b79513c25de07962bc0e447b79f4c7f319d148030ad62c0e84f94cf084cdb41f63f5b452ceb396af9dbbbe154e8187681687b60abd75343f40ab0ebad7436fff26d5328c0b8ef96b669ad423a1781470025ce3860f964eaeb64f3ef3a6bf4a4e2d49810577c3a3de8ec6dcdf0d2d24637e70e6337de5"], &(0x7f0000000640)=""/156, 0x9c) dup2(r0, 0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) 20:34:44 executing program 1: r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) r1 = socket$inet6(0xa, 0x3, 0xff) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000040)='\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="080000000000000086ef8c2e636a3ba47c1004cfd86617a1e16be0154d3af3975d4f01b7382414bb1abb186ecaf513403717cef2b7ef05a02684bd185ba3175f39517550ffa5d3bd65bc5004f95b56b2c8fbccb80f87c1e48defe3b07f3e10420b3f777a"], 0x0, 0x1400) r2 = open(&(0x7f0000000100)='./bus\x00', 0x11250c2, 0x0) r3 = memfd_create(&(0x7f0000000100)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00m\x80L\xa1\xbek\x11<\x84C/K\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) sysfs$2(0x2, 0x4, &(0x7f00000003c0)=""/15) r4 = dup2(r3, 0xffffffffffffffff) name_to_handle_at(r4, &(0x7f0000000040)='\x00', &(0x7f0000000080)=ANY=[], 0x0, 0x1400) recvfrom$inet6(r4, &(0x7f0000000240)=""/147, 0x93, 0x10002, &(0x7f0000000300)={0xa, 0x4e24, 0xeb88, @private0={0xfc, 0x0, [], 0x1}, 0x2}, 0x1c) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r5, 0x208200) io_setup(0x202, &(0x7f00000004c0)=0x0) io_submit(r6, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000400)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendfile(r0, r2, 0x0, 0x8000fffffffe) 20:34:44 executing program 2: perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) [ 1601.926821] EXT4-fs (loop0): bad geometry: block count 1080 exceeds size of device (1 blocks) [ 1602.122463] audit: type=1800 audit(5885210085.253:217): pid=30754 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=17731 res=0 [ 1602.674181] EXT4-fs (loop3): bad geometry: block count 1080 exceeds size of device (1 blocks) [ 1602.830912] EXT4-fs (loop0): Unrecognized mount option "" or missing value [ 1602.850289] EXT4-fs (loop0): failed to parse options in superblock:  [ 1602.870700] EXT4-fs (loop0): inodes count not valid: 536871552 vs 128 [ 1602.966620] EXT4-fs (loop3): Unrecognized mount option "" or missing value [ 1602.983193] EXT4-fs (loop3): failed to parse options in superblock:  [ 1603.034674] EXT4-fs (loop3): inodes count not valid: 536871552 vs 128 20:34:47 executing program 2: perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 20:34:47 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) r2 = memfd_create(&(0x7f0000000680)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa0\x16\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2O\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc0\xdc\x14\xeb\f\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xf7v\x87\xbb\xaf\xaa\xf8\xd68\x813a/\xc41\xae\x14\"\x85\x99\x97\xed\xec\x13\x8a\xe2E\xab/\xd4TE\f\xe9<\".\xc6\xbcK\xf8T=6\'\x05u\x8f\x01\xb8\xce{\x9d\xb0\xee\x1e\x89\x13Ze\xa5\xf4\x16\x93\xaa\x19V\x10\x11?\x82|\x11#\x015\x836>x\x06\xbd7S\x9c!\xee\xf6\xa4\x9aqf\xe7-+(m\xaf\x1f\x8dzqW\b\xa5x\xf1r\xf1\xc6u\x8d\xd1@\xf2\xb0\x93\x98f)\x1e)K\x81\x90n\x9c\xcf5\xb9\xbc\x14\xd84/\x9c8[/\x99k\xa5\x9fc0j\xc1!\xec\xe2\xba\x1f\x8c\xe4\x1a\x83\x1b\x84> 5Ib\x8c\x8e`\x92\xcbc\xd5\x18\x80x\x15\xa5\x84\x1e\xd4\x86\x19\x1a\xbcU\xf4Da\xbaP\xa8\x8c0\xf9\xaa\x87q\t\xda\xca\nt\xc6F\x9a\xe4\xf5\x86\x97\xde\xe1\x12\x88\x01\xc1O\xd44=&\x8a\xa4|D\x00C\xa9z\xe1d/\xea\xcc@\xf2\x7f\"\'\xc5\'\xe1\x9a\xd1h.\xab', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) 20:34:47 executing program 1: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x2c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_ADDRESS={0xa, 0x1, @link_local={0x0}}]}, 0x2c}}, 0x0) 20:34:47 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) unshare(0x8020000) 20:34:47 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:34:47 executing program 3: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:34:47 executing program 2: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:34:47 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) r2 = memfd_create(&(0x7f0000000680)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa0\x16\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2O\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc0\xdc\x14\xeb\f\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xf7v\x87\xbb\xaf\xaa\xf8\xd68\x813a/\xc41\xae\x14\"\x85\x99\x97\xed\xec\x13\x8a\xe2E\xab/\xd4TE\f\xe9<\".\xc6\xbcK\xf8T=6\'\x05u\x8f\x01\xb8\xce{\x9d\xb0\xee\x1e\x89\x13Ze\xa5\xf4\x16\x93\xaa\x19V\x10\x11?\x82|\x11#\x015\x836>x\x06\xbd7S\x9c!\xee\xf6\xa4\x9aqf\xe7-+(m\xaf\x1f\x8dzqW\b\xa5x\xf1r\xf1\xc6u\x8d\xd1@\xf2\xb0\x93\x98f)\x1e)K\x81\x90n\x9c\xcf5\xb9\xbc\x14\xd84/\x9c8[/\x99k\xa5\x9fc0j\xc1!\xec\xe2\xba\x1f\x8c\xe4\x1a\x83\x1b\x84> 5Ib\x8c\x8e`\x92\xcbc\xd5\x18\x80x\x15\xa5\x84\x1e\xd4\x86\x19\x1a\xbcU\xf4Da\xbaP\xa8\x8c0\xf9\xaa\x87q\t\xda\xca\nt\xc6F\x9a\xe4\xf5\x86\x97\xde\xe1\x12\x88\x01\xc1O\xd44=&\x8a\xa4|D\x00C\xa9z\xe1d/\xea\xcc@\xf2\x7f\"\'\xc5\'\xe1\x9a\xd1h.\xab', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) 20:34:47 executing program 1: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:34:47 executing program 0: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:34:48 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = memfd_create(&(0x7f0000000680)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa0\x16\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2O\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc0\xdc\x14\xeb\f\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xf7v\x87\xbb\xaf\xaa\xf8\xd68\x813a/\xc41\xae\x14\"\x85\x99\x97\xed\xec\x13\x8a\xe2E\xab/\xd4TE\f\xe9<\".\xc6\xbcK\xf8T=6\'\x05u\x8f\x01\xb8\xce{\x9d\xb0\xee\x1e\x89\x13Ze\xa5\xf4\x16\x93\xaa\x19V\x10\x11?\x82|\x11#\x015\x836>x\x06\xbd7S\x9c!\xee\xf6\xa4\x9aqf\xe7-+(m\xaf\x1f\x8dzqW\b\xa5x\xf1r\xf1\xc6u\x8d\xd1@\xf2\xb0\x93\x98f)\x1e)K\x81\x90n\x9c\xcf5\xb9\xbc\x14\xd84/\x9c8[/\x99k\xa5\x9fc0j\xc1!\xec\xe2\xba\x1f\x8c\xe4\x1a\x83\x1b\x84> 5Ib\x8c\x8e`\x92\xcbc\xd5\x18\x80x\x15\xa5\x84\x1e\xd4\x86\x19\x1a\xbcU\xf4Da\xbaP\xa8\x8c0\xf9\xaa\x87q\t\xda\xca\nt\xc6F\x9a\xe4\xf5\x86\x97\xde\xe1\x12\x88\x01\xc1O\xd44=&\x8a\xa4|D\x00C\xa9z\xe1d/\xea\xcc@\xf2\x7f\"\'\xc5\'\xe1\x9a\xd1h.\xab', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) 20:34:48 executing program 1: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:34:48 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = memfd_create(&(0x7f0000000680)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa0\x16\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2O\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc0\xdc\x14\xeb\f\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xf7v\x87\xbb\xaf\xaa\xf8\xd68\x813a/\xc41\xae\x14\"\x85\x99\x97\xed\xec\x13\x8a\xe2E\xab/\xd4TE\f\xe9<\".\xc6\xbcK\xf8T=6\'\x05u\x8f\x01\xb8\xce{\x9d\xb0\xee\x1e\x89\x13Ze\xa5\xf4\x16\x93\xaa\x19V\x10\x11?\x82|\x11#\x015\x836>x\x06\xbd7S\x9c!\xee\xf6\xa4\x9aqf\xe7-+(m\xaf\x1f\x8dzqW\b\xa5x\xf1r\xf1\xc6u\x8d\xd1@\xf2\xb0\x93\x98f)\x1e)K\x81\x90n\x9c\xcf5\xb9\xbc\x14\xd84/\x9c8[/\x99k\xa5\x9fc0j\xc1!\xec\xe2\xba\x1f\x8c\xe4\x1a\x83\x1b\x84> 5Ib\x8c\x8e`\x92\xcbc\xd5\x18\x80x\x15\xa5\x84\x1e\xd4\x86\x19\x1a\xbcU\xf4Da\xbaP\xa8\x8c0\xf9\xaa\x87q\t\xda\xca\nt\xc6F\x9a\xe4\xf5\x86\x97\xde\xe1\x12\x88\x01\xc1O\xd44=&\x8a\xa4|D\x00C\xa9z\xe1d/\xea\xcc@\xf2\x7f\"\'\xc5\'\xe1\x9a\xd1h.\xab', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) 20:34:48 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x100082) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = memfd_create(&(0x7f0000000680)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa0\x16\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2O\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc0\xdc\x14\xeb\f\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xf7v\x87\xbb\xaf\xaa\xf8\xd68\x813a/\xc41\xae\x14\"\x85\x99\x97\xed\xec\x13\x8a\xe2E\xab/\xd4TE\f\xe9<\".\xc6\xbcK\xf8T=6\'\x05u\x8f\x01\xb8\xce{\x9d\xb0\xee\x1e\x89\x13Ze\xa5\xf4\x16\x93\xaa\x19V\x10\x11?\x82|\x11#\x015\x836>x\x06\xbd7S\x9c!\xee\xf6\xa4\x9aqf\xe7-+(m\xaf\x1f\x8dzqW\b\xa5x\xf1r\xf1\xc6u\x8d\xd1@\xf2\xb0\x93\x98f)\x1e)K\x81\x90n\x9c\xcf5\xb9\xbc\x14\xd84/\x9c8[/\x99k\xa5\x9fc0j\xc1!\xec\xe2\xba\x1f\x8c\xe4\x1a\x83\x1b\x84> 5Ib\x8c\x8e`\x92\xcbc\xd5\x18\x80x\x15\xa5\x84\x1e\xd4\x86\x19\x1a\xbcU\xf4Da\xbaP\xa8\x8c0\xf9\xaa\x87q\t\xda\xca\nt\xc6F\x9a\xe4\xf5\x86\x97\xde\xe1\x12\x88\x01\xc1O\xd44=&\x8a\xa4|D\x00C\xa9z\xe1d/\xea\xcc@\xf2\x7f\"\'\xc5\'\xe1\x9a\xd1h.\xab', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) 20:34:48 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x100082) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000680)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa0\x16\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2O\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc0\xdc\x14\xeb\f\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xf7v\x87\xbb\xaf\xaa\xf8\xd68\x813a/\xc41\xae\x14\"\x85\x99\x97\xed\xec\x13\x8a\xe2E\xab/\xd4TE\f\xe9<\".\xc6\xbcK\xf8T=6\'\x05u\x8f\x01\xb8\xce{\x9d\xb0\xee\x1e\x89\x13Ze\xa5\xf4\x16\x93\xaa\x19V\x10\x11?\x82|\x11#\x015\x836>x\x06\xbd7S\x9c!\xee\xf6\xa4\x9aqf\xe7-+(m\xaf\x1f\x8dzqW\b\xa5x\xf1r\xf1\xc6u\x8d\xd1@\xf2\xb0\x93\x98f)\x1e)K\x81\x90n\x9c\xcf5\xb9\xbc\x14\xd84/\x9c8[/\x99k\xa5\x9fc0j\xc1!\xec\xe2\xba\x1f\x8c\xe4\x1a\x83\x1b\x84> 5Ib\x8c\x8e`\x92\xcbc\xd5\x18\x80x\x15\xa5\x84\x1e\xd4\x86\x19\x1a\xbcU\xf4Da\xbaP\xa8\x8c0\xf9\xaa\x87q\t\xda\xca\nt\xc6F\x9a\xe4\xf5\x86\x97\xde\xe1\x12\x88\x01\xc1O\xd44=&\x8a\xa4|D\x00C\xa9z\xe1d/\xea\xcc@\xf2\x7f\"\'\xc5\'\xe1\x9a\xd1h.\xab', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) 20:34:48 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x100082) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000680)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa0\x16\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2O\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc0\xdc\x14\xeb\f\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xf7v\x87\xbb\xaf\xaa\xf8\xd68\x813a/\xc41\xae\x14\"\x85\x99\x97\xed\xec\x13\x8a\xe2E\xab/\xd4TE\f\xe9<\".\xc6\xbcK\xf8T=6\'\x05u\x8f\x01\xb8\xce{\x9d\xb0\xee\x1e\x89\x13Ze\xa5\xf4\x16\x93\xaa\x19V\x10\x11?\x82|\x11#\x015\x836>x\x06\xbd7S\x9c!\xee\xf6\xa4\x9aqf\xe7-+(m\xaf\x1f\x8dzqW\b\xa5x\xf1r\xf1\xc6u\x8d\xd1@\xf2\xb0\x93\x98f)\x1e)K\x81\x90n\x9c\xcf5\xb9\xbc\x14\xd84/\x9c8[/\x99k\xa5\x9fc0j\xc1!\xec\xe2\xba\x1f\x8c\xe4\x1a\x83\x1b\x84> 5Ib\x8c\x8e`\x92\xcbc\xd5\x18\x80x\x15\xa5\x84\x1e\xd4\x86\x19\x1a\xbcU\xf4Da\xbaP\xa8\x8c0\xf9\xaa\x87q\t\xda\xca\nt\xc6F\x9a\xe4\xf5\x86\x97\xde\xe1\x12\x88\x01\xc1O\xd44=&\x8a\xa4|D\x00C\xa9z\xe1d/\xea\xcc@\xf2\x7f\"\'\xc5\'\xe1\x9a\xd1h.\xab', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) 20:34:50 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:34:50 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x100082) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000680)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa0\x16\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2O\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc0\xdc\x14\xeb\f\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xf7v\x87\xbb\xaf\xaa\xf8\xd68\x813a/\xc41\xae\x14\"\x85\x99\x97\xed\xec\x13\x8a\xe2E\xab/\xd4TE\f\xe9<\".\xc6\xbcK\xf8T=6\'\x05u\x8f\x01\xb8\xce{\x9d\xb0\xee\x1e\x89\x13Ze\xa5\xf4\x16\x93\xaa\x19V\x10\x11?\x82|\x11#\x015\x836>x\x06\xbd7S\x9c!\xee\xf6\xa4\x9aqf\xe7-+(m\xaf\x1f\x8dzqW\b\xa5x\xf1r\xf1\xc6u\x8d\xd1@\xf2\xb0\x93\x98f)\x1e)K\x81\x90n\x9c\xcf5\xb9\xbc\x14\xd84/\x9c8[/\x99k\xa5\x9fc0j\xc1!\xec\xe2\xba\x1f\x8c\xe4\x1a\x83\x1b\x84> 5Ib\x8c\x8e`\x92\xcbc\xd5\x18\x80x\x15\xa5\x84\x1e\xd4\x86\x19\x1a\xbcU\xf4Da\xbaP\xa8\x8c0\xf9\xaa\x87q\t\xda\xca\nt\xc6F\x9a\xe4\xf5\x86\x97\xde\xe1\x12\x88\x01\xc1O\xd44=&\x8a\xa4|D\x00C\xa9z\xe1d/\xea\xcc@\xf2\x7f\"\'\xc5\'\xe1\x9a\xd1h.\xab', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) 20:34:50 executing program 2: perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 20:34:50 executing program 3: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:34:50 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:34:51 executing program 0: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:34:51 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000680)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa0\x16\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2O\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc0\xdc\x14\xeb\f\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xf7v\x87\xbb\xaf\xaa\xf8\xd68\x813a/\xc41\xae\x14\"\x85\x99\x97\xed\xec\x13\x8a\xe2E\xab/\xd4TE\f\xe9<\".\xc6\xbcK\xf8T=6\'\x05u\x8f\x01\xb8\xce{\x9d\xb0\xee\x1e\x89\x13Ze\xa5\xf4\x16\x93\xaa\x19V\x10\x11?\x82|\x11#\x015\x836>x\x06\xbd7S\x9c!\xee\xf6\xa4\x9aqf\xe7-+(m\xaf\x1f\x8dzqW\b\xa5x\xf1r\xf1\xc6u\x8d\xd1@\xf2\xb0\x93\x98f)\x1e)K\x81\x90n\x9c\xcf5\xb9\xbc\x14\xd84/\x9c8[/\x99k\xa5\x9fc0j\xc1!\xec\xe2\xba\x1f\x8c\xe4\x1a\x83\x1b\x84> 5Ib\x8c\x8e`\x92\xcbc\xd5\x18\x80x\x15\xa5\x84\x1e\xd4\x86\x19\x1a\xbcU\xf4Da\xbaP\xa8\x8c0\xf9\xaa\x87q\t\xda\xca\nt\xc6F\x9a\xe4\xf5\x86\x97\xde\xe1\x12\x88\x01\xc1O\xd44=&\x8a\xa4|D\x00C\xa9z\xe1d/\xea\xcc@\xf2\x7f\"\'\xc5\'\xe1\x9a\xd1h.\xab', 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x1000) 20:34:51 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000", @ANYRES16=r3, @ANYBLOB="05000000ac8dfc359150df6f0000"], 0x14}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="a5a4f852cb83b9b52de3938c259965720b8de17943886c2ac3ea5a8557e8614ab016487b4397a2d7e7b5b571e825a98a1e020c14afd8c2b60318586837f9a3861a2d343dea1606c6bbcb246f2f6adb802c27d6886254ddda2628a040deb23646d33781a572d3388c7885275903f0", @ANYRES16=r3, @ANYBLOB="04002dbd7000ffdbdf250300000008000200001000000500060040000000"], 0x24}, 0x1, 0x0, 0x0, 0xc0c5}, 0x8850) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r4, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="7400000001080101000000000000000002000006050003000600000006000240001900001400048008000740ffffbfec080004400000800106000240000c000006000240001a000006000240831400000500030088000000fdffffff080002400000000408000240000000020800024000000080"], 0x74}, 0x1, 0x0, 0x0, 0x41}, 0x800) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') r6 = socket$nl_netfilter(0x10, 0x3, 0xc) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r6, r7, 0x0, 0x800009) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(0xffffffffffffffff, r8, 0x0, 0x800009) ioctl$SNDRV_PCM_IOCTL_STATUS32(r8, 0x806c4120, &(0x7f0000000340)) setsockopt$SO_TIMESTAMP(r6, 0x1, 0x40, &(0x7f00000001c0)=0x6e49497f, 0x4) ioctl$FITHAW(r6, 0xc0045878) sendfile(r4, r5, 0x0, 0x800009) 20:34:51 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000680)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa0\x16\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2O\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc0\xdc\x14\xeb\f\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xf7v\x87\xbb\xaf\xaa\xf8\xd68\x813a/\xc41\xae\x14\"\x85\x99\x97\xed\xec\x13\x8a\xe2E\xab/\xd4TE\f\xe9<\".\xc6\xbcK\xf8T=6\'\x05u\x8f\x01\xb8\xce{\x9d\xb0\xee\x1e\x89\x13Ze\xa5\xf4\x16\x93\xaa\x19V\x10\x11?\x82|\x11#\x015\x836>x\x06\xbd7S\x9c!\xee\xf6\xa4\x9aqf\xe7-+(m\xaf\x1f\x8dzqW\b\xa5x\xf1r\xf1\xc6u\x8d\xd1@\xf2\xb0\x93\x98f)\x1e)K\x81\x90n\x9c\xcf5\xb9\xbc\x14\xd84/\x9c8[/\x99k\xa5\x9fc0j\xc1!\xec\xe2\xba\x1f\x8c\xe4\x1a\x83\x1b\x84> 5Ib\x8c\x8e`\x92\xcbc\xd5\x18\x80x\x15\xa5\x84\x1e\xd4\x86\x19\x1a\xbcU\xf4Da\xbaP\xa8\x8c0\xf9\xaa\x87q\t\xda\xca\nt\xc6F\x9a\xe4\xf5\x86\x97\xde\xe1\x12\x88\x01\xc1O\xd44=&\x8a\xa4|D\x00C\xa9z\xe1d/\xea\xcc@\xf2\x7f\"\'\xc5\'\xe1\x9a\xd1h.\xab', 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x1000) 20:34:51 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:34:51 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000680)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa0\x16\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2O\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc0\xdc\x14\xeb\f\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xf7v\x87\xbb\xaf\xaa\xf8\xd68\x813a/\xc41\xae\x14\"\x85\x99\x97\xed\xec\x13\x8a\xe2E\xab/\xd4TE\f\xe9<\".\xc6\xbcK\xf8T=6\'\x05u\x8f\x01\xb8\xce{\x9d\xb0\xee\x1e\x89\x13Ze\xa5\xf4\x16\x93\xaa\x19V\x10\x11?\x82|\x11#\x015\x836>x\x06\xbd7S\x9c!\xee\xf6\xa4\x9aqf\xe7-+(m\xaf\x1f\x8dzqW\b\xa5x\xf1r\xf1\xc6u\x8d\xd1@\xf2\xb0\x93\x98f)\x1e)K\x81\x90n\x9c\xcf5\xb9\xbc\x14\xd84/\x9c8[/\x99k\xa5\x9fc0j\xc1!\xec\xe2\xba\x1f\x8c\xe4\x1a\x83\x1b\x84> 5Ib\x8c\x8e`\x92\xcbc\xd5\x18\x80x\x15\xa5\x84\x1e\xd4\x86\x19\x1a\xbcU\xf4Da\xbaP\xa8\x8c0\xf9\xaa\x87q\t\xda\xca\nt\xc6F\x9a\xe4\xf5\x86\x97\xde\xe1\x12\x88\x01\xc1O\xd44=&\x8a\xa4|D\x00C\xa9z\xe1d/\xea\xcc@\xf2\x7f\"\'\xc5\'\xe1\x9a\xd1h.\xab', 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x1000) 20:34:51 executing program 2: perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) [ 1608.202400] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 20:34:51 executing program 5: r0 = syz_open_dev$loop(0x0, 0x0, 0x100082) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000680)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa0\x16\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2O\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc0\xdc\x14\xeb\f\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xf7v\x87\xbb\xaf\xaa\xf8\xd68\x813a/\xc41\xae\x14\"\x85\x99\x97\xed\xec\x13\x8a\xe2E\xab/\xd4TE\f\xe9<\".\xc6\xbcK\xf8T=6\'\x05u\x8f\x01\xb8\xce{\x9d\xb0\xee\x1e\x89\x13Ze\xa5\xf4\x16\x93\xaa\x19V\x10\x11?\x82|\x11#\x015\x836>x\x06\xbd7S\x9c!\xee\xf6\xa4\x9aqf\xe7-+(m\xaf\x1f\x8dzqW\b\xa5x\xf1r\xf1\xc6u\x8d\xd1@\xf2\xb0\x93\x98f)\x1e)K\x81\x90n\x9c\xcf5\xb9\xbc\x14\xd84/\x9c8[/\x99k\xa5\x9fc0j\xc1!\xec\xe2\xba\x1f\x8c\xe4\x1a\x83\x1b\x84> 5Ib\x8c\x8e`\x92\xcbc\xd5\x18\x80x\x15\xa5\x84\x1e\xd4\x86\x19\x1a\xbcU\xf4Da\xbaP\xa8\x8c0\xf9\xaa\x87q\t\xda\xca\nt\xc6F\x9a\xe4\xf5\x86\x97\xde\xe1\x12\x88\x01\xc1O\xd44=&\x8a\xa4|D\x00C\xa9z\xe1d/\xea\xcc@\xf2\x7f\"\'\xc5\'\xe1\x9a\xd1h.\xab', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r3) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) 20:34:51 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:34:51 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000", @ANYRES16=r3, @ANYBLOB="05000000ac8dfc359150df6f0000"], 0x14}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="a5a4f852cb83b9b52de3938c259965720b8de17943886c2ac3ea5a8557e8614ab016487b4397a2d7e7b5b571e825a98a1e020c14afd8c2b60318586837f9a3861a2d343dea1606c6bbcb246f2f6adb802c27d6886254ddda2628a040deb23646d33781a572d3388c7885275903f0", @ANYRES16=r3, @ANYBLOB="04002dbd7000ffdbdf250300000008000200001000000500060040000000"], 0x24}, 0x1, 0x0, 0x0, 0xc0c5}, 0x8850) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r4, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="7400000001080101000000000000000002000006050003000600000006000240001900001400048008000740ffffbfec080004400000800106000240000c000006000240001a000006000240831400000500030088000000fdffffff080002400000000408000240000000020800024000000080"], 0x74}, 0x1, 0x0, 0x0, 0x41}, 0x800) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') r6 = socket$nl_netfilter(0x10, 0x3, 0xc) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r6, r7, 0x0, 0x800009) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(0xffffffffffffffff, r8, 0x0, 0x800009) ioctl$SNDRV_PCM_IOCTL_STATUS32(r8, 0x806c4120, &(0x7f0000000340)) setsockopt$SO_TIMESTAMP(r6, 0x1, 0x40, &(0x7f00000001c0)=0x6e49497f, 0x4) ioctl$FITHAW(r6, 0xc0045878) sendfile(r4, r5, 0x0, 0x800009) [ 1608.519551] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 20:34:53 executing program 5: r0 = syz_open_dev$loop(0x0, 0x0, 0x100082) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000680)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa0\x16\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2O\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc0\xdc\x14\xeb\f\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xf7v\x87\xbb\xaf\xaa\xf8\xd68\x813a/\xc41\xae\x14\"\x85\x99\x97\xed\xec\x13\x8a\xe2E\xab/\xd4TE\f\xe9<\".\xc6\xbcK\xf8T=6\'\x05u\x8f\x01\xb8\xce{\x9d\xb0\xee\x1e\x89\x13Ze\xa5\xf4\x16\x93\xaa\x19V\x10\x11?\x82|\x11#\x015\x836>x\x06\xbd7S\x9c!\xee\xf6\xa4\x9aqf\xe7-+(m\xaf\x1f\x8dzqW\b\xa5x\xf1r\xf1\xc6u\x8d\xd1@\xf2\xb0\x93\x98f)\x1e)K\x81\x90n\x9c\xcf5\xb9\xbc\x14\xd84/\x9c8[/\x99k\xa5\x9fc0j\xc1!\xec\xe2\xba\x1f\x8c\xe4\x1a\x83\x1b\x84> 5Ib\x8c\x8e`\x92\xcbc\xd5\x18\x80x\x15\xa5\x84\x1e\xd4\x86\x19\x1a\xbcU\xf4Da\xbaP\xa8\x8c0\xf9\xaa\x87q\t\xda\xca\nt\xc6F\x9a\xe4\xf5\x86\x97\xde\xe1\x12\x88\x01\xc1O\xd44=&\x8a\xa4|D\x00C\xa9z\xe1d/\xea\xcc@\xf2\x7f\"\'\xc5\'\xe1\x9a\xd1h.\xab', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r3) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) 20:34:53 executing program 1 (fault-call:2 fault-nth:0): perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) [ 1610.838928] FAULT_INJECTION: forcing a failure. [ 1610.838928] name failslab, interval 1, probability 0, space 0, times 0 [ 1610.887794] CPU: 1 PID: 31065 Comm: syz-executor.1 Not tainted 4.19.124-syzkaller #0 [ 1610.895733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1610.905125] Call Trace: [ 1610.907791] dump_stack+0x1fc/0x2fe [ 1610.911456] should_fail.cold+0xa/0x14 [ 1610.915380] ? setup_fault_attr+0x200/0x200 [ 1610.919740] __should_failslab+0x115/0x180 [ 1610.923995] should_failslab+0x5/0xf [ 1610.927730] __kmalloc+0x2ab/0x3c0 [ 1610.931289] ? rw_copy_check_uvector+0x289/0x330 [ 1610.936066] rw_copy_check_uvector+0x289/0x330 [ 1610.940681] import_iovec+0xa6/0x3a0 [ 1610.944410] ? dup_iter+0x250/0x250 [ 1610.948083] ? proc_fail_nth_write+0x95/0x1d0 [ 1610.952597] ? proc_tid_io_accounting+0x20/0x20 [ 1610.957291] vfs_readv+0xc6/0x160 [ 1610.960765] ? compat_rw_copy_check_uvector+0x400/0x400 [ 1610.966144] ? lock_downgrade+0x740/0x740 [ 1610.970396] ? lock_acquire+0x170/0x3c0 [ 1610.974393] ? check_preemption_disabled+0x41/0x280 [ 1610.979436] ? __fget+0x345/0x520 [ 1610.982910] ? ksys_dup3+0x3c0/0x3c0 [ 1610.986647] ? check_preemption_disabled+0x41/0x280 [ 1610.991687] ? perf_trace_preemptirq_template+0x2e3/0x460 [ 1610.997247] do_preadv+0x1b6/0x270 [ 1611.000802] ? do_readv+0x330/0x330 [ 1611.004446] ? do_syscall_64+0x21/0x620 [ 1611.008437] ? trace_hardirqs_off+0x64/0x200 [ 1611.012866] ? do_syscall_64+0x21/0x620 [ 1611.016866] do_syscall_64+0xf9/0x620 [ 1611.020689] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1611.025886] RIP: 0033:0x45ca29 [ 1611.029091] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1611.048091] RSP: 002b:00007fcb5dce8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1611.055817] RAX: ffffffffffffffda RBX: 00000000004fa6c0 RCX: 000000000045ca29 [ 1611.063109] RDX: 100000000000022c RSI: 0000000020000480 RDI: 0000000000000003 [ 1611.070391] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1611.077674] R10: 6c00000000000000 R11: 0000000000000246 R12: 0000000000000004 20:34:54 executing program 0: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:34:54 executing program 2: perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 20:34:54 executing program 5: r0 = syz_open_dev$loop(0x0, 0x0, 0x100082) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000680)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa0\x16\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2O\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc0\xdc\x14\xeb\f\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xf7v\x87\xbb\xaf\xaa\xf8\xd68\x813a/\xc41\xae\x14\"\x85\x99\x97\xed\xec\x13\x8a\xe2E\xab/\xd4TE\f\xe9<\".\xc6\xbcK\xf8T=6\'\x05u\x8f\x01\xb8\xce{\x9d\xb0\xee\x1e\x89\x13Ze\xa5\xf4\x16\x93\xaa\x19V\x10\x11?\x82|\x11#\x015\x836>x\x06\xbd7S\x9c!\xee\xf6\xa4\x9aqf\xe7-+(m\xaf\x1f\x8dzqW\b\xa5x\xf1r\xf1\xc6u\x8d\xd1@\xf2\xb0\x93\x98f)\x1e)K\x81\x90n\x9c\xcf5\xb9\xbc\x14\xd84/\x9c8[/\x99k\xa5\x9fc0j\xc1!\xec\xe2\xba\x1f\x8c\xe4\x1a\x83\x1b\x84> 5Ib\x8c\x8e`\x92\xcbc\xd5\x18\x80x\x15\xa5\x84\x1e\xd4\x86\x19\x1a\xbcU\xf4Da\xbaP\xa8\x8c0\xf9\xaa\x87q\t\xda\xca\nt\xc6F\x9a\xe4\xf5\x86\x97\xde\xe1\x12\x88\x01\xc1O\xd44=&\x8a\xa4|D\x00C\xa9z\xe1d/\xea\xcc@\xf2\x7f\"\'\xc5\'\xe1\x9a\xd1h.\xab', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r3) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) [ 1611.084954] R13: 0000000000000862 R14: 00000000004cb43c R15: 00007fcb5dce96d4 20:34:54 executing program 1 (fault-call:2 fault-nth:1): perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 20:34:54 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000640)='/proc/sysvipc/sem\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$nbd(&(0x7f00000006c0)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x38, r1, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x3}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x7}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x3ff}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x43, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) setsockopt$SO_BINDTODEVICE_wg(r2, 0x1, 0x19, &(0x7f00000001c0)='wg2\x00', 0x4) mmap(&(0x7f0000003000/0x2000)=nil, 0x7fffdfffc000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="485ea410acd10e95ab6e0f34001000a523ebed569bacfe0d571e1b11cbb1768149c96ddb7b8df5246c71fa363fb1cb6f69d63d0a3e0a2372c8ae649644861e91d8b67a97a8966ea836e918a7e722b2fffa9f36e5648fe21e9701c4e97e78968650daec2d9eb3fb3b8a5cd664e139df156585a3cdaa17f97c0a0bf181935a96f3c8ae99eec42f873619d2289f1436739207a7bf857155e97dfd4b3450ef68cd19420643efe20e886cb50bf00244b37f8f92e14d8f0364950362597102", @ANYRES32=0x0, @ANYBLOB="c7269e50b20caf973b12aad96e59c7ec539c403195957dc08cb8d3a8f88bb90de2ed2063e419cb371644cf7e72f5df98731d6392d7094c2d18b8a0fc5b6cb896c8584b43cf958a892694db7950bc0000000062f84c000000000000"], 0x5}}, 0x0) connect$rose(r2, &(0x7f00000000c0)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1, [@bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}]}, 0x40) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000002c0)='./bus\x00', 0x7, 0x0, 0x0, 0x0, &(0x7f0000000980)={[{@upgrade='upgrade'}, {@meta='meta'}, {@acl='acl'}]}) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETXF(r3, 0x5434, &(0x7f0000000180)={0x8, 0x7, [0x6, 0x8, 0x20, 0x0, 0x6], 0x4}) 20:34:54 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000680)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa0\x16\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2O\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc0\xdc\x14\xeb\f\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xf7v\x87\xbb\xaf\xaa\xf8\xd68\x813a/\xc41\xae\x14\"\x85\x99\x97\xed\xec\x13\x8a\xe2E\xab/\xd4TE\f\xe9<\".\xc6\xbcK\xf8T=6\'\x05u\x8f\x01\xb8\xce{\x9d\xb0\xee\x1e\x89\x13Ze\xa5\xf4\x16\x93\xaa\x19V\x10\x11?\x82|\x11#\x015\x836>x\x06\xbd7S\x9c!\xee\xf6\xa4\x9aqf\xe7-+(m\xaf\x1f\x8dzqW\b\xa5x\xf1r\xf1\xc6u\x8d\xd1@\xf2\xb0\x93\x98f)\x1e)K\x81\x90n\x9c\xcf5\xb9\xbc\x14\xd84/\x9c8[/\x99k\xa5\x9fc0j\xc1!\xec\xe2\xba\x1f\x8c\xe4\x1a\x83\x1b\x84> 5Ib\x8c\x8e`\x92\xcbc\xd5\x18\x80x\x15\xa5\x84\x1e\xd4\x86\x19\x1a\xbcU\xf4Da\xbaP\xa8\x8c0\xf9\xaa\x87q\t\xda\xca\nt\xc6F\x9a\xe4\xf5\x86\x97\xde\xe1\x12\x88\x01\xc1O\xd44=&\x8a\xa4|D\x00C\xa9z\xe1d/\xea\xcc@\xf2\x7f\"\'\xc5\'\xe1\x9a\xd1h.\xab', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r3) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) [ 1611.277950] FAULT_INJECTION: forcing a failure. [ 1611.277950] name failslab, interval 1, probability 0, space 0, times 0 [ 1611.372876] CPU: 0 PID: 31077 Comm: syz-executor.1 Not tainted 4.19.124-syzkaller #0 [ 1611.380816] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1611.390191] Call Trace: [ 1611.392827] dump_stack+0x1fc/0x2fe [ 1611.396482] should_fail.cold+0xa/0x14 [ 1611.400395] ? setup_fault_attr+0x200/0x200 [ 1611.404741] __should_failslab+0x115/0x180 [ 1611.409021] should_failslab+0x5/0xf [ 1611.412750] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 1611.417868] __kmalloc_node+0x38/0x70 20:34:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x5008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x54001, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)}, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x3f000000, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@gid={'gid'}}]}) r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x800009) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='setgroups\x00') sendfile(r1, r2, 0x0, 0x800009) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r3, r4, 0x0, 0x800009) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r5, r6, 0x0, 0x800009) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0xa4, 0x0, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x5d}, @NBD_ATTR_SOCKETS={0x1c, 0x7, 0x0, 0x1, [{0x8}, {0x8}, {0x8}]}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x2}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x9}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xd1}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SOCKETS={0x24, 0x7, 0x0, 0x1, [{0x8}, {0x8, 0x1, r2}, {0x8, 0x1, r4}, {0x8, 0x1, r6}]}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x3f}]}, 0xa4}, 0x1, 0x0, 0x0, 0x200080c4}, 0x20000001) stat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)) [ 1611.421707] kvmalloc_node+0x61/0xf0 [ 1611.425430] traverse+0x3d7/0x720 [ 1611.428905] ? traverse+0x720/0x720 [ 1611.432543] seq_read+0x8cd/0x10c0 [ 1611.436109] ? traverse+0x720/0x720 [ 1611.439747] proc_reg_read+0x1bd/0x280 [ 1611.443655] ? proc_reg_write+0x280/0x280 [ 1611.447836] do_iter_read+0x46b/0x640 [ 1611.451686] vfs_readv+0xf0/0x160 [ 1611.455157] ? compat_rw_copy_check_uvector+0x400/0x400 [ 1611.460535] ? lock_downgrade+0x740/0x740 [ 1611.464691] ? lock_acquire+0x170/0x3c0 [ 1611.468682] ? check_preemption_disabled+0x41/0x280 [ 1611.473715] ? __fget+0x345/0x520 [ 1611.477184] ? ksys_dup3+0x3c0/0x3c0 [ 1611.480929] ? check_preemption_disabled+0x41/0x280 [ 1611.485962] ? perf_trace_preemptirq_template+0x2e3/0x460 [ 1611.491514] do_preadv+0x1b6/0x270 [ 1611.495065] ? do_readv+0x330/0x330 [ 1611.498702] ? do_syscall_64+0x21/0x620 [ 1611.502687] ? trace_hardirqs_off+0x64/0x200 [ 1611.507108] ? do_syscall_64+0x21/0x620 [ 1611.511094] do_syscall_64+0xf9/0x620 [ 1611.514909] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1611.520106] RIP: 0033:0x45ca29 [ 1611.523317] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1611.542232] RSP: 002b:00007fcb5dce8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1611.549958] RAX: ffffffffffffffda RBX: 00000000004fa6c0 RCX: 000000000045ca29 [ 1611.557245] RDX: 100000000000022c RSI: 0000000020000480 RDI: 0000000000000003 [ 1611.564526] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1611.571911] R10: 6c00000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1611.572561] new mount options do not match the existing superblock, will be ignored [ 1611.579190] R13: 0000000000000862 R14: 00000000004cb43c R15: 00007fcb5dce96d4 20:34:54 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000680)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa0\x16\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2O\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc0\xdc\x14\xeb\f\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xf7v\x87\xbb\xaf\xaa\xf8\xd68\x813a/\xc41\xae\x14\"\x85\x99\x97\xed\xec\x13\x8a\xe2E\xab/\xd4TE\f\xe9<\".\xc6\xbcK\xf8T=6\'\x05u\x8f\x01\xb8\xce{\x9d\xb0\xee\x1e\x89\x13Ze\xa5\xf4\x16\x93\xaa\x19V\x10\x11?\x82|\x11#\x015\x836>x\x06\xbd7S\x9c!\xee\xf6\xa4\x9aqf\xe7-+(m\xaf\x1f\x8dzqW\b\xa5x\xf1r\xf1\xc6u\x8d\xd1@\xf2\xb0\x93\x98f)\x1e)K\x81\x90n\x9c\xcf5\xb9\xbc\x14\xd84/\x9c8[/\x99k\xa5\x9fc0j\xc1!\xec\xe2\xba\x1f\x8c\xe4\x1a\x83\x1b\x84> 5Ib\x8c\x8e`\x92\xcbc\xd5\x18\x80x\x15\xa5\x84\x1e\xd4\x86\x19\x1a\xbcU\xf4Da\xbaP\xa8\x8c0\xf9\xaa\x87q\t\xda\xca\nt\xc6F\x9a\xe4\xf5\x86\x97\xde\xe1\x12\x88\x01\xc1O\xd44=&\x8a\xa4|D\x00C\xa9z\xe1d/\xea\xcc@\xf2\x7f\"\'\xc5\'\xe1\x9a\xd1h.\xab', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r3) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) 20:34:54 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:34:55 executing program 3: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:34:55 executing program 2: r0 = socket$kcm(0x2, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r1, r2, 0x0, 0x800009) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f00000001c0)={0x42, 0x2, 0x2}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0xb, &(0x7f0000000000), 0x4) sendmsg$inet(r0, &(0x7f0000001700)={&(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10, 0x0}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r3, r4, 0x0, 0x800009) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x40, &(0x7f00000001c0)=0x6e49497f, 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x2) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r7 = socket(0xa, 0x80000, 0x3) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFNETMASK(r8, 0x891c, &(0x7f0000000180)={'team_slave_1\x00', {0x2, 0x4e20, @remote}}) sendmsg$nl_route_sched(r7, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=ANY=[@ANYBLOB="2c00000024000b19000027f1dd8da9c29795664300000000", @ANYRES32=r6, @ANYBLOB="00000000f1ff000000000000000301006d71000016399623d244094c348dd00573ee0f6739386cc2c7f9b0bba0eecef761e661f69b6bef58e67b9bde748bb11d56f91d315cf60f76e101b32e871da908473c69d352f06680856a373f4ae3f4529aa65c0b8c880cf760d9d2"], 0x2c}}, 0x0) sendto$packet(0xffffffffffffffff, &(0x7f0000000080)="c2688bc1b90de8cbe39bd9689ef39a6241e8e1ccd2d2a70cb96d9b757b8a621a0472ce3171938dcde58070edd38cdac74de19fa74136767baf0fdee825366fc56739a96327e1364c778976d3af59ca0e06de422d702cfe923dd6ded8a91fa5c5f5ba09d50a1f0802526e6a98c2a26a17fcfeaf1c8a03ee70358b08e46c52076d6ef82930cd7c8d7eb84a86e6c315a5424cc515181a54733e4e1041e8086756e0", 0xa0, 0x10000000, &(0x7f0000000140)={0x11, 0x9, r6, 0x1, 0x40, 0x6, @random="0772f69881cf"}, 0x14) [ 1611.705819] hfs: can't find a HFS filesystem on dev loop3 [ 1611.767497] new mount options do not match the existing superblock, will be ignored [ 1611.809856] hfs: can't find a HFS filesystem on dev loop3 20:34:55 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x0) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) chown(0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, 0x0}, 0x7ffe}], 0x1, 0x0, &(0x7f0000003340)={0x0, 0x3938700}) sched_setattr(0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000180)='127.0.0.1\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000300)='9p\x00', 0x0, 0x0) r1 = socket(0x6, 0x8000c, 0x3) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080), 0x4) mount$9p_tcp(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f0000000040)='./file0/file0/file0\x00', &(0x7f0000000140)='9p\x00', 0x18a8001, &(0x7f0000000440)=ANY=[@ANYRESHEX, @ANYRES64, @ANYRESDEC, @ANYRESHEX=r0, @ANYRESOCT, @ANYRESDEC, @ANYRES64=r1]) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_bt_hci(r2, 0x800448d5, &(0x7f0000000540)) sendmsg$SOCK_DESTROY(0xffffffffffffffff, &(0x7f0000001c40)={0x0, 0x0, &(0x7f0000001c00)={0x0}}, 0x0) mkdir(&(0x7f0000000240)='./file0/file0\x00', 0x0) creat(&(0x7f0000000080)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="6c360e000000000001000000000000006f726b6469723d2e2f62696c65312c75707065726469723d2e2f1866696c65"]) rmdir(&(0x7f00000000c0)='./bus/file0\x00') 20:34:55 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000680)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa0\x16\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2O\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc0\xdc\x14\xeb\f\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xf7v\x87\xbb\xaf\xaa\xf8\xd68\x813a/\xc41\xae\x14\"\x85\x99\x97\xed\xec\x13\x8a\xe2E\xab/\xd4TE\f\xe9<\".\xc6\xbcK\xf8T=6\'\x05u\x8f\x01\xb8\xce{\x9d\xb0\xee\x1e\x89\x13Ze\xa5\xf4\x16\x93\xaa\x19V\x10\x11?\x82|\x11#\x015\x836>x\x06\xbd7S\x9c!\xee\xf6\xa4\x9aqf\xe7-+(m\xaf\x1f\x8dzqW\b\xa5x\xf1r\xf1\xc6u\x8d\xd1@\xf2\xb0\x93\x98f)\x1e)K\x81\x90n\x9c\xcf5\xb9\xbc\x14\xd84/\x9c8[/\x99k\xa5\x9fc0j\xc1!\xec\xe2\xba\x1f\x8c\xe4\x1a\x83\x1b\x84> 5Ib\x8c\x8e`\x92\xcbc\xd5\x18\x80x\x15\xa5\x84\x1e\xd4\x86\x19\x1a\xbcU\xf4Da\xbaP\xa8\x8c0\xf9\xaa\x87q\t\xda\xca\nt\xc6F\x9a\xe4\xf5\x86\x97\xde\xe1\x12\x88\x01\xc1O\xd44=&\x8a\xa4|D\x00C\xa9z\xe1d/\xea\xcc@\xf2\x7f\"\'\xc5\'\xe1\x9a\xd1h.\xab', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r3) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) [ 1612.333937] 9pnet_virtio: no channels available for device 127.0.0.1 [ 1612.427438] overlayfs: unrecognized mount option "l6" or missing value 20:34:55 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000680)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa0\x16\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2O\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc0\xdc\x14\xeb\f\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xf7v\x87\xbb\xaf\xaa\xf8\xd68\x813a/\xc41\xae\x14\"\x85\x99\x97\xed\xec\x13\x8a\xe2E\xab/\xd4TE\f\xe9<\".\xc6\xbcK\xf8T=6\'\x05u\x8f\x01\xb8\xce{\x9d\xb0\xee\x1e\x89\x13Ze\xa5\xf4\x16\x93\xaa\x19V\x10\x11?\x82|\x11#\x015\x836>x\x06\xbd7S\x9c!\xee\xf6\xa4\x9aqf\xe7-+(m\xaf\x1f\x8dzqW\b\xa5x\xf1r\xf1\xc6u\x8d\xd1@\xf2\xb0\x93\x98f)\x1e)K\x81\x90n\x9c\xcf5\xb9\xbc\x14\xd84/\x9c8[/\x99k\xa5\x9fc0j\xc1!\xec\xe2\xba\x1f\x8c\xe4\x1a\x83\x1b\x84> 5Ib\x8c\x8e`\x92\xcbc\xd5\x18\x80x\x15\xa5\x84\x1e\xd4\x86\x19\x1a\xbcU\xf4Da\xbaP\xa8\x8c0\xf9\xaa\x87q\t\xda\xca\nt\xc6F\x9a\xe4\xf5\x86\x97\xde\xe1\x12\x88\x01\xc1O\xd44=&\x8a\xa4|D\x00C\xa9z\xe1d/\xea\xcc@\xf2\x7f\"\'\xc5\'\xe1\x9a\xd1h.\xab', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r3) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) [ 1612.520110] 9pnet_virtio: no channels available for device 127.0.0.1 [ 1612.549542] overlayfs: unrecognized mount option "l6" or missing value 20:34:55 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000680)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa0\x16\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2O\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc0\xdc\x14\xeb\f\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xf7v\x87\xbb\xaf\xaa\xf8\xd68\x813a/\xc41\xae\x14\"\x85\x99\x97\xed\xec\x13\x8a\xe2E\xab/\xd4TE\f\xe9<\".\xc6\xbcK\xf8T=6\'\x05u\x8f\x01\xb8\xce{\x9d\xb0\xee\x1e\x89\x13Ze\xa5\xf4\x16\x93\xaa\x19V\x10\x11?\x82|\x11#\x015\x836>x\x06\xbd7S\x9c!\xee\xf6\xa4\x9aqf\xe7-+(m\xaf\x1f\x8dzqW\b\xa5x\xf1r\xf1\xc6u\x8d\xd1@\xf2\xb0\x93\x98f)\x1e)K\x81\x90n\x9c\xcf5\xb9\xbc\x14\xd84/\x9c8[/\x99k\xa5\x9fc0j\xc1!\xec\xe2\xba\x1f\x8c\xe4\x1a\x83\x1b\x84> 5Ib\x8c\x8e`\x92\xcbc\xd5\x18\x80x\x15\xa5\x84\x1e\xd4\x86\x19\x1a\xbcU\xf4Da\xbaP\xa8\x8c0\xf9\xaa\x87q\t\xda\xca\nt\xc6F\x9a\xe4\xf5\x86\x97\xde\xe1\x12\x88\x01\xc1O\xd44=&\x8a\xa4|D\x00C\xa9z\xe1d/\xea\xcc@\xf2\x7f\"\'\xc5\'\xe1\x9a\xd1h.\xab', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r3) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) 20:34:55 executing program 1: perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 20:34:55 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000680)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa0\x16\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2O\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc0\xdc\x14\xeb\f\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xf7v\x87\xbb\xaf\xaa\xf8\xd68\x813a/\xc41\xae\x14\"\x85\x99\x97\xed\xec\x13\x8a\xe2E\xab/\xd4TE\f\xe9<\".\xc6\xbcK\xf8T=6\'\x05u\x8f\x01\xb8\xce{\x9d\xb0\xee\x1e\x89\x13Ze\xa5\xf4\x16\x93\xaa\x19V\x10\x11?\x82|\x11#\x015\x836>x\x06\xbd7S\x9c!\xee\xf6\xa4\x9aqf\xe7-+(m\xaf\x1f\x8dzqW\b\xa5x\xf1r\xf1\xc6u\x8d\xd1@\xf2\xb0\x93\x98f)\x1e)K\x81\x90n\x9c\xcf5\xb9\xbc\x14\xd84/\x9c8[/\x99k\xa5\x9fc0j\xc1!\xec\xe2\xba\x1f\x8c\xe4\x1a\x83\x1b\x84> 5Ib\x8c\x8e`\x92\xcbc\xd5\x18\x80x\x15\xa5\x84\x1e\xd4\x86\x19\x1a\xbcU\xf4Da\xbaP\xa8\x8c0\xf9\xaa\x87q\t\xda\xca\nt\xc6F\x9a\xe4\xf5\x86\x97\xde\xe1\x12\x88\x01\xc1O\xd44=&\x8a\xa4|D\x00C\xa9z\xe1d/\xea\xcc@\xf2\x7f\"\'\xc5\'\xe1\x9a\xd1h.\xab', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) 20:34:56 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x0) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) chown(0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, 0x0}, 0x7ffe}], 0x1, 0x161, &(0x7f0000003340)={0x0, 0x3938700}) sched_setattr(0x0, 0x0, 0x0) pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000080)="a7", 0x1) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000580)={'raw\x00', 0x9b, "3a27a90f4a84f390d4cb3c3a4a8fdc9620b29671b7895a594312bb808837b4c8285d1ce796166f25e4842728def2bae0d77d6ab9641b4d707e844dc9a60767612d530ccc8d28714beca63e29e66367e9b2f0c542ecd70fe5d0433d81c72dc426e125a97771cebfaee6dfc4cbdb0a9db6f8076fe2c72dc8b3962d494b31664b841242589a6a1c3cc891b6df7a6965bde0acd03a451886b8c3bf97ad"}, &(0x7f0000000140)=0xbf) mount$9p_tcp(&(0x7f0000000180)='127.0.0.1\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0) r1 = socket(0x40000000002, 0x3, 0x80000000002) setsockopt$inet_int(r1, 0x0, 0x4, 0x0, 0x0) mount$9p_tcp(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x18a8001, &(0x7f00000004c0)=ANY=[@ANYRESHEX, @ANYRESOCT, @ANYBLOB=',nodevmap,', @ANYRESHEX=r0, @ANYRESDEC=0x0, @ANYBLOB=',context=staff_u,eu', @ANYRESDEC=0x0]) sendmsg$SOCK_DESTROY(0xffffffffffffffff, &(0x7f0000001c40)={0x0, 0x0, &(0x7f0000001c00)={0x0}}, 0x0) mkdir(&(0x7f0000000240)='./file0/file0\x00', 0x0) creat(&(0x7f0000000080)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) rmdir(&(0x7f00000000c0)='./bus/file0\x00') 20:34:56 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000680)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa0\x16\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2O\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc0\xdc\x14\xeb\f\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xf7v\x87\xbb\xaf\xaa\xf8\xd68\x813a/\xc41\xae\x14\"\x85\x99\x97\xed\xec\x13\x8a\xe2E\xab/\xd4TE\f\xe9<\".\xc6\xbcK\xf8T=6\'\x05u\x8f\x01\xb8\xce{\x9d\xb0\xee\x1e\x89\x13Ze\xa5\xf4\x16\x93\xaa\x19V\x10\x11?\x82|\x11#\x015\x836>x\x06\xbd7S\x9c!\xee\xf6\xa4\x9aqf\xe7-+(m\xaf\x1f\x8dzqW\b\xa5x\xf1r\xf1\xc6u\x8d\xd1@\xf2\xb0\x93\x98f)\x1e)K\x81\x90n\x9c\xcf5\xb9\xbc\x14\xd84/\x9c8[/\x99k\xa5\x9fc0j\xc1!\xec\xe2\xba\x1f\x8c\xe4\x1a\x83\x1b\x84> 5Ib\x8c\x8e`\x92\xcbc\xd5\x18\x80x\x15\xa5\x84\x1e\xd4\x86\x19\x1a\xbcU\xf4Da\xbaP\xa8\x8c0\xf9\xaa\x87q\t\xda\xca\nt\xc6F\x9a\xe4\xf5\x86\x97\xde\xe1\x12\x88\x01\xc1O\xd44=&\x8a\xa4|D\x00C\xa9z\xe1d/\xea\xcc@\xf2\x7f\"\'\xc5\'\xe1\x9a\xd1h.\xab', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) 20:34:56 executing program 0: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="5c00000014001105000000100000000052c5f6175fcff1f271489c94e19382917f00000100000000000000000000000000000000000000000000000000000000316b562613413649079eae85ed14891a514bf8b794bcdda5ad7b03c979be519674c814d8a597a36a393da7da47a9941f39d53b7f0a23b90b25d307b4ee7cb3fa96b5b459dc7b3c0777608b04e11e0f501eead44c819c74db2fac4f402760e88f0b9dc24bd98518f6ebff2aad77c8a9de74ec58c05b07fcad571892ee495dbe5c0558ed7625b7638779bd13ac13dcaced3843", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000c00080018000040ed07b28aa35e5e591b2784bb1fa5dd1907145c54436cab6d0d3cef5d38f5d236a906"], 0x5c}}, 0x0) socket$inet6(0xa, 0x2, 0xfffffffd) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) r2 = dup(r0) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(0x0) r5 = syz_init_net_socket$nl_rdma(0xffffffffffffffff, 0x3, 0x14) ioctl$SIOCGSTAMPNS(r5, 0x8907, &(0x7f0000000280)) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r3, &(0x7f00000001c0)={0x0, 0xfffffc38, &(0x7f0000000180)={&(0x7f0000000600)={0xa4, r4, 0x23f, 0x0, 0x0, {{}, {}, {0x13, 0x14, 'broadcast-link\x00'}}}, 0xa4}, 0x1, 0xfffffff0}, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="20f326bd7000fcdbdf2501000000000000000941000000140018000000037564703a7300000000000000"], 0x30}, 0x1, 0x0, 0x0, 0x40804}, 0x40440) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r6, r7, 0x0, 0x800009) mmap$perf(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2000001, 0x8010, r7, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmmsg(r8, &(0x7f0000000200), 0x0, 0x40000) [ 1613.413006] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 20:34:58 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:34:58 executing program 1: perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000002, 0x6c00000000000000) 20:34:58 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000680)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa0\x16\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2O\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc0\xdc\x14\xeb\f\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xf7v\x87\xbb\xaf\xaa\xf8\xd68\x813a/\xc41\xae\x14\"\x85\x99\x97\xed\xec\x13\x8a\xe2E\xab/\xd4TE\f\xe9<\".\xc6\xbcK\xf8T=6\'\x05u\x8f\x01\xb8\xce{\x9d\xb0\xee\x1e\x89\x13Ze\xa5\xf4\x16\x93\xaa\x19V\x10\x11?\x82|\x11#\x015\x836>x\x06\xbd7S\x9c!\xee\xf6\xa4\x9aqf\xe7-+(m\xaf\x1f\x8dzqW\b\xa5x\xf1r\xf1\xc6u\x8d\xd1@\xf2\xb0\x93\x98f)\x1e)K\x81\x90n\x9c\xcf5\xb9\xbc\x14\xd84/\x9c8[/\x99k\xa5\x9fc0j\xc1!\xec\xe2\xba\x1f\x8c\xe4\x1a\x83\x1b\x84> 5Ib\x8c\x8e`\x92\xcbc\xd5\x18\x80x\x15\xa5\x84\x1e\xd4\x86\x19\x1a\xbcU\xf4Da\xbaP\xa8\x8c0\xf9\xaa\x87q\t\xda\xca\nt\xc6F\x9a\xe4\xf5\x86\x97\xde\xe1\x12\x88\x01\xc1O\xd44=&\x8a\xa4|D\x00C\xa9z\xe1d/\xea\xcc@\xf2\x7f\"\'\xc5\'\xe1\x9a\xd1h.\xab', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) 20:34:58 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) write$P9_RSTATFS(r1, &(0x7f0000000240)={0x43, 0x9, 0x1, {0x0, 0x0, 0x1, 0x1f, 0x2, 0x2, 0x9, 0x0, 0x8}}, 0x43) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x800009) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0xa, 0xfffffffffffffff9, 0xfffffffffffffeff, 0x1ce}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsu\x00', 0x511100, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="0101000000000000000001000000000000000f000000004c0018000000007564700000e8ff00"/98], 0x68}}, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000008fc0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000091c0)={0x0, 0x0, &(0x7f0000009180)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000", @ANYRES16=r5, @ANYBLOB="b50300030000000a000004"], 0x3}}, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r5, 0x0, 0x70bd2b, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8001}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000884}, 0x80) close(r2) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x1) ftruncate(0xffffffffffffffff, 0x200004) sendfile(r2, 0xffffffffffffffff, 0x0, 0x80001d00c0d0) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f00000003c0)={0x8, 0x120, 0xfa00, {0x4, {0x1000, 0x6, "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", 0x2, 0x80, 0x7, 0x3d, 0x20, 0x1}}}, 0x128) 20:34:58 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000880)={0x0, 0x70, 0x0, 0x0, 0x6, 0x0, 0x0, 0x1f5400000, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x8100, 0x0, 0x1000, 0x0, 0x1, 0x0, 0x3f}, 0x0, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2080, 0x3, 0x0, 0x0, 0x8775}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) splice(r1, 0x0, r3, 0x0, 0x100000, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e22, @multicast2}, 0x10) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/tcp6\x00') r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000100), 0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000180)={r5, 0x80000001, 0x30}, 0xc) 20:34:58 executing program 3: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:34:58 executing program 1: perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000003, 0x6c00000000000000) 20:34:58 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000680)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa0\x16\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2O\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc0\xdc\x14\xeb\f\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xf7v\x87\xbb\xaf\xaa\xf8\xd68\x813a/\xc41\xae\x14\"\x85\x99\x97\xed\xec\x13\x8a\xe2E\xab/\xd4TE\f\xe9<\".\xc6\xbcK\xf8T=6\'\x05u\x8f\x01\xb8\xce{\x9d\xb0\xee\x1e\x89\x13Ze\xa5\xf4\x16\x93\xaa\x19V\x10\x11?\x82|\x11#\x015\x836>x\x06\xbd7S\x9c!\xee\xf6\xa4\x9aqf\xe7-+(m\xaf\x1f\x8dzqW\b\xa5x\xf1r\xf1\xc6u\x8d\xd1@\xf2\xb0\x93\x98f)\x1e)K\x81\x90n\x9c\xcf5\xb9\xbc\x14\xd84/\x9c8[/\x99k\xa5\x9fc0j\xc1!\xec\xe2\xba\x1f\x8c\xe4\x1a\x83\x1b\x84> 5Ib\x8c\x8e`\x92\xcbc\xd5\x18\x80x\x15\xa5\x84\x1e\xd4\x86\x19\x1a\xbcU\xf4Da\xbaP\xa8\x8c0\xf9\xaa\x87q\t\xda\xca\nt\xc6F\x9a\xe4\xf5\x86\x97\xde\xe1\x12\x88\x01\xc1O\xd44=&\x8a\xa4|D\x00C\xa9z\xe1d/\xea\xcc@\xf2\x7f\"\'\xc5\'\xe1\x9a\xd1h.\xab', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) 20:34:58 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:34:58 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x0, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:34:58 executing program 1: perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000004, 0x6c00000000000000) 20:34:58 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000680)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa0\x16\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2O\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc0\xdc\x14\xeb\f\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xf7v\x87\xbb\xaf\xaa\xf8\xd68\x813a/\xc41\xae\x14\"\x85\x99\x97\xed\xec\x13\x8a\xe2E\xab/\xd4TE\f\xe9<\".\xc6\xbcK\xf8T=6\'\x05u\x8f\x01\xb8\xce{\x9d\xb0\xee\x1e\x89\x13Ze\xa5\xf4\x16\x93\xaa\x19V\x10\x11?\x82|\x11#\x015\x836>x\x06\xbd7S\x9c!\xee\xf6\xa4\x9aqf\xe7-+(m\xaf\x1f\x8dzqW\b\xa5x\xf1r\xf1\xc6u\x8d\xd1@\xf2\xb0\x93\x98f)\x1e)K\x81\x90n\x9c\xcf5\xb9\xbc\x14\xd84/\x9c8[/\x99k\xa5\x9fc0j\xc1!\xec\xe2\xba\x1f\x8c\xe4\x1a\x83\x1b\x84> 5Ib\x8c\x8e`\x92\xcbc\xd5\x18\x80x\x15\xa5\x84\x1e\xd4\x86\x19\x1a\xbcU\xf4Da\xbaP\xa8\x8c0\xf9\xaa\x87q\t\xda\xca\nt\xc6F\x9a\xe4\xf5\x86\x97\xde\xe1\x12\x88\x01\xc1O\xd44=&\x8a\xa4|D\x00C\xa9z\xe1d/\xea\xcc@\xf2\x7f\"\'\xc5\'\xe1\x9a\xd1h.\xab', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) 20:34:58 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x0, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:34:58 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x45) r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcsu\x00', 0x2000, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000180)={0x6, 0x3, 0x4, 0x10, 0xb5, {0x0, 0x2710}, {0x3, 0x3, 0x9, 0x81, 0xf7, 0x1, "abb33513"}, 0xffff8000, 0x4, @userptr=0x4, 0x7f}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/zoneinfo\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_SW_PARAMS(r2, 0xc0884113, &(0x7f0000000240)={0x1, 0x1000, 0x1, 0x8, 0x1, 0x10001, 0x81, 0x2, 0xbff, 0x5, 0x1f, 0x2}) ioctl$VIDIOC_TRY_DECODER_CMD(r0, 0xc0485661, &(0x7f00000000c0)={0x6, 0x2, @raw_data=[0x4, 0x7b, 0x1ff00, 0x401, 0x2, 0x8, 0x4, 0x1, 0x2, 0x80, 0x3, 0x2, 0x7f, 0x80, 0x59, 0x3a78]}) 20:34:58 executing program 1: perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000005, 0x6c00000000000000) 20:34:58 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm-monitor\x00', 0x10d000, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000300)=0x1000049) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x6c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xe, 0x3, 'bitmap:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x24, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_NETMASK={0x5, 0x14, 0x2}, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @dev}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x6c}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x60, 0x2, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xe, 0x3, 'bitmap:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_NETMASK={0x5, 0x14, 0x2}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x60}}, 0x0) r4 = dup2(r2, r3) ioctl$SNDRV_PCM_IOCTL_XRUN(r4, 0x4148, 0x0) bind$inet6(r1, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="48000000070a01010000000000000000010000043400040100666962000d00010073796e70726f7879000000000c000100636f756e74657200"], 0x48}}, 0x20000000) syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x7, 0xc100) r5 = socket$packet(0x11, 0x3, 0x300) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$packet_add_memb(r5, 0x107, 0x1, &(0x7f0000000040)={r6, 0x3, 0x2, @local}, 0x10) 20:34:59 executing program 2: r0 = getpgrp(0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r4, r5, 0x0, 0x800009) setsockopt$SO_TIMESTAMP(r4, 0x1, 0x40, &(0x7f00000001c0)=0x6e49497f, 0x4) poll(&(0x7f0000000040)=[{r1}, {r3, 0x8}, {0xffffffffffffffff, 0x1000}, {r4, 0x821d}], 0x4, 0x5) 20:35:01 executing program 3: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:35:01 executing program 1: perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000006, 0x6c00000000000000) 20:35:01 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000680)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa0\x16\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2O\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc0\xdc\x14\xeb\f\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xf7v\x87\xbb\xaf\xaa\xf8\xd68\x813a/\xc41\xae\x14\"\x85\x99\x97\xed\xec\x13\x8a\xe2E\xab/\xd4TE\f\xe9<\".\xc6\xbcK\xf8T=6\'\x05u\x8f\x01\xb8\xce{\x9d\xb0\xee\x1e\x89\x13Ze\xa5\xf4\x16\x93\xaa\x19V\x10\x11?\x82|\x11#\x015\x836>x\x06\xbd7S\x9c!\xee\xf6\xa4\x9aqf\xe7-+(m\xaf\x1f\x8dzqW\b\xa5x\xf1r\xf1\xc6u\x8d\xd1@\xf2\xb0\x93\x98f)\x1e)K\x81\x90n\x9c\xcf5\xb9\xbc\x14\xd84/\x9c8[/\x99k\xa5\x9fc0j\xc1!\xec\xe2\xba\x1f\x8c\xe4\x1a\x83\x1b\x84> 5Ib\x8c\x8e`\x92\xcbc\xd5\x18\x80x\x15\xa5\x84\x1e\xd4\x86\x19\x1a\xbcU\xf4Da\xbaP\xa8\x8c0\xf9\xaa\x87q\t\xda\xca\nt\xc6F\x9a\xe4\xf5\x86\x97\xde\xe1\x12\x88\x01\xc1O\xd44=&\x8a\xa4|D\x00C\xa9z\xe1d/\xea\xcc@\xf2\x7f\"\'\xc5\'\xe1\x9a\xd1h.\xab', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) 20:35:01 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x0, 0x6}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:35:01 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm-monitor\x00', 0x10d000, 0x0) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000300)=0x1000049) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x6c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xe, 0x3, 'bitmap:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x24, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_NETMASK={0x5, 0x14, 0x2}, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @dev}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x6c}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x60, 0x2, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xe, 0x3, 'bitmap:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_NETMASK={0x5, 0x14, 0x2}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x60}}, 0x0) r4 = dup2(r2, r3) ioctl$SNDRV_PCM_IOCTL_XRUN(r4, 0x4148, 0x0) bind$inet6(r1, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="48000000070a01010000000000000000010000043400040100666962000d00010073796e70726f7879000000000c000100636f756e74657200"], 0x48}}, 0x20000000) syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x7, 0xc100) r5 = socket$packet(0x11, 0x3, 0x300) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$packet_add_memb(r5, 0x107, 0x1, &(0x7f0000000040)={r6, 0x3, 0x2, @local}, 0x10) 20:35:01 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) mount(&(0x7f00000005c0)=ANY=[], &(0x7f0000000100)='./bus\x00', &(0x7f0000000140)='ubifs\x00', 0x0, 0x0) readlinkat(0xffffffffffffff9c, &(0x7f0000000040)='./bus\x00', &(0x7f0000000180)=""/142, 0x8e) recvfrom$l2tp6(r0, &(0x7f0000000240)=""/180, 0xb4, 0x2162, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote}, 0x20) setxattr$security_selinux(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000300)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:nvram_device_t:s0\x00', 0x24, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r1, r2, 0x0, 0x800009) ioctl$BLKBSZSET(r2, 0x40081271, &(0x7f0000000480)=0x9) futex$FUTEX_WAIT_MULTIPLE(&(0x7f0000000400)=[{&(0x7f0000000380), 0x2}, {&(0x7f00000003c0), 0x2}], 0xd, 0x2, &(0x7f0000000440)={0x77359400}, 0x0, 0x0) 20:35:01 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f00000003c0)=ANY=[@ANYBLOB="e77e8210418528ba1dfc6552a01e04d90eec3af9f573636efcfe0d917a7a1a3025fecfd5dfe1993f73518d5af82b263d4536184ad1a321f01855e817bee7a738ab1004ac5e93a438540ec688adb806a6860fa8e3590b3357038c278a713013783b33bf2795619cfd39f9594c9c733f2777648d6e3f15f7113e798b2ac2c6ea03ddcfa2ad375758b8797b142fec16fc1135cdaa14da648eb0139042620399ee44344581"]) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="0600000000000000c0"], &(0x7f00000002c0)=""/248, 0xf8) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:35:01 executing program 1: perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000007, 0x6c00000000000000) 20:35:01 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000680)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa0\x16\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2O\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc0\xdc\x14\xeb\f\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xf7v\x87\xbb\xaf\xaa\xf8\xd68\x813a/\xc41\xae\x14\"\x85\x99\x97\xed\xec\x13\x8a\xe2E\xab/\xd4TE\f\xe9<\".\xc6\xbcK\xf8T=6\'\x05u\x8f\x01\xb8\xce{\x9d\xb0\xee\x1e\x89\x13Ze\xa5\xf4\x16\x93\xaa\x19V\x10\x11?\x82|\x11#\x015\x836>x\x06\xbd7S\x9c!\xee\xf6\xa4\x9aqf\xe7-+(m\xaf\x1f\x8dzqW\b\xa5x\xf1r\xf1\xc6u\x8d\xd1@\xf2\xb0\x93\x98f)\x1e)K\x81\x90n\x9c\xcf5\xb9\xbc\x14\xd84/\x9c8[/\x99k\xa5\x9fc0j\xc1!\xec\xe2\xba\x1f\x8c\xe4\x1a\x83\x1b\x84> 5Ib\x8c\x8e`\x92\xcbc\xd5\x18\x80x\x15\xa5\x84\x1e\xd4\x86\x19\x1a\xbcU\xf4Da\xbaP\xa8\x8c0\xf9\xaa\x87q\t\xda\xca\nt\xc6F\x9a\xe4\xf5\x86\x97\xde\xe1\x12\x88\x01\xc1O\xd44=&\x8a\xa4|D\x00C\xa9z\xe1d/\xea\xcc@\xf2\x7f\"\'\xc5\'\xe1\x9a\xd1h.\xab', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) 20:35:01 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000680)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa0\x16\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2O\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc0\xdc\x14\xeb\f\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xf7v\x87\xbb\xaf\xaa\xf8\xd68\x813a/\xc41\xae\x14\"\x85\x99\x97\xed\xec\x13\x8a\xe2E\xab/\xd4TE\f\xe9<\".\xc6\xbcK\xf8T=6\'\x05u\x8f\x01\xb8\xce{\x9d\xb0\xee\x1e\x89\x13Ze\xa5\xf4\x16\x93\xaa\x19V\x10\x11?\x82|\x11#\x015\x836>x\x06\xbd7S\x9c!\xee\xf6\xa4\x9aqf\xe7-+(m\xaf\x1f\x8dzqW\b\xa5x\xf1r\xf1\xc6u\x8d\xd1@\xf2\xb0\x93\x98f)\x1e)K\x81\x90n\x9c\xcf5\xb9\xbc\x14\xd84/\x9c8[/\x99k\xa5\x9fc0j\xc1!\xec\xe2\xba\x1f\x8c\xe4\x1a\x83\x1b\x84> 5Ib\x8c\x8e`\x92\xcbc\xd5\x18\x80x\x15\xa5\x84\x1e\xd4\x86\x19\x1a\xbcU\xf4Da\xbaP\xa8\x8c0\xf9\xaa\x87q\t\xda\xca\nt\xc6F\x9a\xe4\xf5\x86\x97\xde\xe1\x12\x88\x01\xc1O\xd44=&\x8a\xa4|D\x00C\xa9z\xe1d/\xea\xcc@\xf2\x7f\"\'\xc5\'\xe1\x9a\xd1h.\xab', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) [ 1618.578412] UBIFS error (pid: 31391): cannot open "", error -22 [ 1618.581656] audit: type=1400 audit(5885210101.713:218): avc: denied { relabelto } for pid=31384 comm="syz-executor.0" name="bus" dev="sda1" ino=16964 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:nvram_device_t:s0 tclass=file permissive=1 20:35:01 executing program 1: perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000008, 0x6c00000000000000) 20:35:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={r4, @in6={{0xa, 0x0, 0x0, @private1}}}, &(0x7f0000000000)=0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000040)={r4, 0x100}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={r5, 0xd1}, 0x8) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r6, r7, 0x0, 0x800009) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUTCMAP(r8, 0x4611, &(0x7f00000001c0)={0x0, 0x8a22b1c591a5a3f0, 0x0, 0x0, 0x0, 0x0}) openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) 20:35:04 executing program 1: perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000009, 0x6c00000000000000) 20:35:04 executing program 2: socket$can_raw(0x1d, 0x3, 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x6}, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) close(0xffffffffffffffff) getitimer(0x3, &(0x7f0000000000)) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x80000) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x10000000000b5) write$P9_RRENAME(r0, 0x0, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000140)=""/104, 0x68, 0x102, &(0x7f0000000200)={0x11, 0x1c, 0x0, 0x1, 0xdb, 0x6, @multicast}, 0x14) ioctl$SIOCSIFMTU(0xffffffffffffffff, 0x8922, &(0x7f0000000040)={'hsr0\x00', 0x7}) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpgrp(0x0) setpriority(0x0, r1, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x3d, 0x2}, 0x0) timer_getoverrun(0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) 20:35:04 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000680)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa0\x16\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2O\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc0\xdc\x14\xeb\f\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xf7v\x87\xbb\xaf\xaa\xf8\xd68\x813a/\xc41\xae\x14\"\x85\x99\x97\xed\xec\x13\x8a\xe2E\xab/\xd4TE\f\xe9<\".\xc6\xbcK\xf8T=6\'\x05u\x8f\x01\xb8\xce{\x9d\xb0\xee\x1e\x89\x13Ze\xa5\xf4\x16\x93\xaa\x19V\x10\x11?\x82|\x11#\x015\x836>x\x06\xbd7S\x9c!\xee\xf6\xa4\x9aqf\xe7-+(m\xaf\x1f\x8dzqW\b\xa5x\xf1r\xf1\xc6u\x8d\xd1@\xf2\xb0\x93\x98f)\x1e)K\x81\x90n\x9c\xcf5\xb9\xbc\x14\xd84/\x9c8[/\x99k\xa5\x9fc0j\xc1!\xec\xe2\xba\x1f\x8c\xe4\x1a\x83\x1b\x84> 5Ib\x8c\x8e`\x92\xcbc\xd5\x18\x80x\x15\xa5\x84\x1e\xd4\x86\x19\x1a\xbcU\xf4Da\xbaP\xa8\x8c0\xf9\xaa\x87q\t\xda\xca\nt\xc6F\x9a\xe4\xf5\x86\x97\xde\xe1\x12\x88\x01\xc1O\xd44=&\x8a\xa4|D\x00C\xa9z\xe1d/\xea\xcc@\xf2\x7f\"\'\xc5\'\xe1\x9a\xd1h.\xab', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) 20:35:04 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x80001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000180)=ANY=[@ANYBLOB="72617700000000000000004000000000000000000000000000000000000000000200000003000000780300000000000000000000b80000000000000000000000e0020000e0020000e0020000e0020000e0020000030000000000000000000000e0000001ac1e0001000000000000000073797a5f74756e00000000000000000076657468310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000b8000000000000000206000000000000000000000000480049742b4554494d45520000000000000000000000000000000000000000003f40000073797a31000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000c801280200000000000000000000000000000000000000005801686173686c696d69740000000000000000000000000000000000000000036272696467655f736c6176655f3100000000809d00000000000000000008000000000000000000000000000000000000000000000000000000000000f2ff000000000000000009000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000e9000000f1ffffffffffffff00000000000000000000000000000000600053455400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff7aea"], 0x1) r1 = memfd_create(&(0x7f0000000040)='wlan1\xfe', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0xd0000000, 0x0}, 0x0, 0x8, &(0x7f00000000c0)) syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='net/dev_snmp6\x00') 20:35:04 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 1618.587132] UBIFS error (pid: 31391): cannot open "", error -22 [ 1621.503324] IPVS: ftp: loaded support on port[0] = 21 20:35:04 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:35:04 executing program 1: perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x100000000000000a, 0x6c00000000000000) 20:35:04 executing program 0: mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x9) openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xffffffffffffffff, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)=@v2={0x2000000, [{0x20, 0x10000}, {0x3, 0x2}]}, 0x14, 0x1) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ustat(0x0, 0x0) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x8}, 0x8000000200004d1e, 0x800007f, 0x2, 0x0, 0x0, 0x0, 0xfff8}, 0x0, 0x4, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r0, r1, 0x0, 0x800009) ioctl$KVM_GET_LAPIC(r1, 0x8400ae8e, &(0x7f0000000800)={"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"}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x790000000000, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f00000002c0)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf}, 0xb8fb, 0x99, 0x400000000000003, 0x0, 0x0, 0x0, 0x81}) quotactl(0x1, &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000001340)="56ce727f41978fbcd52aa0773e1f0a04f843c38874f76b4eb6b769267b2e4aeb6317d3c6c4c483ff7a83d22289badfe244e96f4bea65e0333add90efb29f592ae726b16d13027231eafe291c1ae72eb47b276a8b405bf27a725224a2b5c1c4557e5ef4c56a759aa43f70c4f160377081caa837a4b3c6083263d43fbef38ce6fb99f5afa56ca0aa8291d95f40c765a0906528a2c37036e46840bb72623e9b47cbe6a2d426cb112335c930a93fe4df7998779e4f70cb7d3e5200a6e2b1a1403d0330f06f79795deb46a9d2278826e334b344b56cf5a30b9d0b46cbec03ff72299bd782d04bd34f16844781ac62d15a5b78b490490a4c1065883e8d809d52235bf98c2b56727b98cae96d549c5cf6b3daa7f119a9babd1197aa317ca6687751d22f8edca7b3166f7c1a4688494e135a6ca68caab3c81f968ff85ba20ce05650b163f99d163f7ae8039421e1413d110deb096814d7233b247df396d74e4c3112572d214e3e9976ea809489d866b16c2ed6dc8ad43fe449ad52aa63df777750f0769da19a747ad9fa65cdf3c963e0dc27d5b5f2d1233991e6e9838e1cde520ee661d1885504e5817cb42eaea5d7e128c38d44bc7c584d90c9cfde4e7a4c49638290740e59b44cda015c06c6c0fc54cb84ec5e05458b5e407842f4cf785bbc062baa4dae7e95452750d44f403c26d12fdc1f2b6ec5b7f6549301786b62779f8e9744fca93255c9b6905475f9b29a2a427dbb36d6929b3120a4ec53f4dbe9a88d224d0a2c05e280342b5154dd11187b10a084f40613111912f6b8a5c6730caff227c6e7fa70dde906d7fe24fd8efcb95ef861505e34a288a0652fc82f5b6d23f6af5242d7da9418bbcbe1531d364e8d6b3c174f71e4d6b291e239374cf2ffe1dfb6193af45d9a04a9ccadcd2e350201312fd2bb8610e65edfb92e9faa83b9157f3652bddba33e373b0417d381b838f8393d9adcf8f2e0444173f72680d3488da3ed190ca2b141c3c32a6d0f4e126cad80d3045a1c46fe6712e334bfdb057ff0e0b17f8554b4ebf7ffeafbd3cd2eb92321a6bb10755042067b0cb9150ab39f646d77a805cd43ec820878c9cba814a25b7e0830bc9bf8a22047f5e3541bdb633b6a8080ec27460c158f0beb96251b64108bc1d591c099fb868bd136971fca1417ed3a3b5c76d75fe468287aff2773d5de094e9f7b78447b29f96b603db17d2c4eddb9f1ee7cb5a71e206a4e9d1cccb864d7d056435c8094512a537612cfc39fc6de3d6ba62c1898ec220efd80bf9541133c4b5da6e4a725ba9a39c5086f3a165851e392cc589c4f6146e34d4f81ecc1ca226b3fbad1b3c77a5bb8f7adaad004690b906bbb2a378c572fc10880ffe784b4bb7acaa3e0e2958b7015d5d1efc68abc9df771a5f591c0d76277b027893fe65c18b566725777ed7cdee86e89f0ac80c709827843657a35c383303a68bae295c728fabb648126917c4cd8561746f55e06dd0e7c3e154f447d22a3fcaa1518302ec056de8532b2a44c8ed2ffba0e81d76b3b350e830f55df23d7602177d3469c44f40d65aa212dcdb4786aa1e5629e1264764e4a49adcd0e31ba4ee059ef4ca86ecb99f0c88118e7c7c30cbe43780674458724db82493e01c97c7ba85424e73eb066633172b93d32abe3dab4c4f3cc44343a02335816c2902c91995dc2976cf47450b334f101fb24f0c776ab7daaee0fb87975ae179565cb83453d0b14e4f95d6fa623e0dda001e91d3969f85473fec8636ad4b4be017ae63f571de20306f1c7bbec70b3f8b5dcf09f9190175bab425465936b72421695ae2980f5bcf04128a4b905a45f713546bf77377a57bb3b036f38b541065e16c3e954a7bae8a42ab2a2dedae169998413b656605662d7b0950910df40dc333a1daaa43789a6cde8c7a5f911f74684d4515c5b2f90752c2a72ab0abb9c1233ee0eb0d62c413549fa04f9906ca60ae64150ee55269ea2fc35538812ee4c86170e8d2e77d2aea3e45edd16ff075db59b1c44c48d9bb313c71e38ff2beba2bfa84919229ad45edadb37c8aa4e82da7dac9c92eb8a97f1d70f40c3bbd12e42a2b0a7a819455a1513c8496253e688cfb80a982ab6f6d6bb4fdbd783bf3cad11c90cf539ee0c2c37e9b8eab51204afc87b9966273581781c26523e1d4a199f7f3d0c95053d3683dfdf98486c0c77d1d22544f6dd100ae178a367c14692af4a706089a8c29dee3840fb56a2bfb72ab280e5e740ac4e5a697c8bd76bb46f3fd64b865e2b45ea19ce117eeb1796f121c646b233aa279a888da6129679688faf7c8a3aabfe0a15df8b69f9300ebf3ad3047701945a7f8bfdaf82587b3e580ad79fe9e41f3586ce11f82248b81565824869cdd2b8cab3dabc49d268b1653648523516e1c4f1fb689beebc2ae70eba7df339504de0d517cd9a0575443c794a2c209ccd232b7aaac4a6d8784bc65be832866b1e0a23c88e70dc5219598ccebea8da0b6452014999f333727e0f73c21634269fdf83834a27e4d1e7e0fbdc842ee94d07e220925bf753c61bd5dfbebe33919acdd3703f07b9f504ad2e5d8a87582485ec80eabba9c1615547ed8c87601eb638d22a4d018b92dfd75831956f556a2322ff673fe76127eba6784c8092c932705bb089433c3a1be57ca9e56c292d6cfc848c3989c8c959511b7e499654bf1e229453dbfb70f2bd814c59e22534337ef8f0150bd5175843d332b79727832ee037e4b808836933ecdd2e675bfaf94d1f76618945000cd574571245f0a050780b305a497b9ab5164d57972c64e8555ab9c439904b843bef86edfadb3abe3f4173db99c6a7b3657c6800eb447b75801ae4fb21d3f13619b1f605438af5fdb869e5bdaf37c0ff6e460e278fe685462eacc2421fc95e87cd9c6cc2b830c2bb32a52f7c6b27848fbc244781ebb8f2e41f827904bfdd6f8317e721ff501ac0f7a6edda3fad54a58b82e560b8371197c8630b205b634a9b37433a799f0c0e41e97f24676fd2ea7a00a50e96a963c29f9fbeaf134b0fdbed96d9417852685b887eb59639e3cd57b27d7fa6d963339321b1579a52cd6d05b465a4328facba8d5539c7f4eba9aa70fbf216c3a79e3dae436f92379e200e303f67aeaf1e05ab3fe646128f3f403ca83b79ab3370fde4b858871ab908baace4842798c02b2de2012594f715958cc9b191e0debb7a839d7d34b6fd984b4a7a82abc7e9eb4a7af80e8d338ae69c2d64eea5a900cc8bb34f16f2a762eeb137f3c61985f16aaeaa154c116c54e92ab67b70163f5de46a07c82d74fe357dd24f19394bb00967e8ed596304b94008b40070dee7934ca658fe5269734cc66595b54a11a6a6d41bd9932ab5210b8b793f47fa43ce1f816b1f4b86ec091e6ead0db476b50a0c5c9c625dc538a15e5ef141ae18e34b2c9d93367cff97b813050dbbbfd04d416d2741072fab201fa91176508ba09853b5f036126604eb22c48e32170da812afe2543eae4d168a2fd538c5a8fad198747ba2c9949aaf91ac0f747e8bc3cd7632044304848b7b2e4ead4638db9c0e87e0f51956427886c5265ac8750d85a2d586a839228eac3b34a5b7e4decf3003830515fad6c978e154098681a95cfeb6aaefb17f74239df83fb643206d1f0c816e60ce9c3ec146d6793467c70dae6446c6f4512ee4d265e302ecb43fa8586b16c0edb02c7267d332d5d985d32503d6d46114014443ab9b8847662bb6ab2245ed0a1115ede342687aaffc50b84ebb5f1059cb9bbbee2ed77b49a83cc39d2a79dcfb44c731a31e4d16b71dc1e0d8f6018b88666314be928796c08e5f00e04c681376d8c35387f93f4143e983b432d1b4d53bcf96ef6ad51e7445d5a1e8f6a1eaf8231355f1ebe71110b62aed854b11b7d5bf2e4dbc1a1bfdf5381061a6ae62591b80f4b1ab1c68b71f9cdfa647990548a2c2ed8428a902fc06dbfeee4eb31eb8f69dc89d6ce0c0cc5b7ea438ef82ffde6142eab3c518dc75b8c79b1b16c0ea98a6f1249ae5ef71085551c7d0fc2828cbf00596f98fc86ba447fc0d2c7c5c9a7815d8a7d30da9676fe217b9ea4c8bf3d2edc2") 20:35:04 executing program 1: perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x100000000000000b, 0x6c00000000000000) 20:35:05 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = memfd_create(&(0x7f0000000680)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa0\x16\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2O\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc0\xdc\x14\xeb\f\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xf7v\x87\xbb\xaf\xaa\xf8\xd68\x813a/\xc41\xae\x14\"\x85\x99\x97\xed\xec\x13\x8a\xe2E\xab/\xd4TE\f\xe9<\".\xc6\xbcK\xf8T=6\'\x05u\x8f\x01\xb8\xce{\x9d\xb0\xee\x1e\x89\x13Ze\xa5\xf4\x16\x93\xaa\x19V\x10\x11?\x82|\x11#\x015\x836>x\x06\xbd7S\x9c!\xee\xf6\xa4\x9aqf\xe7-+(m\xaf\x1f\x8dzqW\b\xa5x\xf1r\xf1\xc6u\x8d\xd1@\xf2\xb0\x93\x98f)\x1e)K\x81\x90n\x9c\xcf5\xb9\xbc\x14\xd84/\x9c8[/\x99k\xa5\x9fc0j\xc1!\xec\xe2\xba\x1f\x8c\xe4\x1a\x83\x1b\x84> 5Ib\x8c\x8e`\x92\xcbc\xd5\x18\x80x\x15\xa5\x84\x1e\xd4\x86\x19\x1a\xbcU\xf4Da\xbaP\xa8\x8c0\xf9\xaa\x87q\t\xda\xca\nt\xc6F\x9a\xe4\xf5\x86\x97\xde\xe1\x12\x88\x01\xc1O\xd44=&\x8a\xa4|D\x00C\xa9z\xe1d/\xea\xcc@\xf2\x7f\"\'\xc5\'\xe1\x9a\xd1h.\xab', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r3) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) [ 1622.192698] IPVS: ftp: loaded support on port[0] = 21 20:35:05 executing program 1: perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x100000000000000c, 0x6c00000000000000) 20:35:05 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f}, 0x0, 0x200, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:35:05 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = memfd_create(&(0x7f0000000680)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa0\x16\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2O\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc0\xdc\x14\xeb\f\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xf7v\x87\xbb\xaf\xaa\xf8\xd68\x813a/\xc41\xae\x14\"\x85\x99\x97\xed\xec\x13\x8a\xe2E\xab/\xd4TE\f\xe9<\".\xc6\xbcK\xf8T=6\'\x05u\x8f\x01\xb8\xce{\x9d\xb0\xee\x1e\x89\x13Ze\xa5\xf4\x16\x93\xaa\x19V\x10\x11?\x82|\x11#\x015\x836>x\x06\xbd7S\x9c!\xee\xf6\xa4\x9aqf\xe7-+(m\xaf\x1f\x8dzqW\b\xa5x\xf1r\xf1\xc6u\x8d\xd1@\xf2\xb0\x93\x98f)\x1e)K\x81\x90n\x9c\xcf5\xb9\xbc\x14\xd84/\x9c8[/\x99k\xa5\x9fc0j\xc1!\xec\xe2\xba\x1f\x8c\xe4\x1a\x83\x1b\x84> 5Ib\x8c\x8e`\x92\xcbc\xd5\x18\x80x\x15\xa5\x84\x1e\xd4\x86\x19\x1a\xbcU\xf4Da\xbaP\xa8\x8c0\xf9\xaa\x87q\t\xda\xca\nt\xc6F\x9a\xe4\xf5\x86\x97\xde\xe1\x12\x88\x01\xc1O\xd44=&\x8a\xa4|D\x00C\xa9z\xe1d/\xea\xcc@\xf2\x7f\"\'\xc5\'\xe1\x9a\xd1h.\xab', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r3) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) [ 1622.632894] ptrace attach of ""[31560] was attempted by "/root/syz-executor.4"[31569] 20:35:05 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000580)=@newqdisc={0x2c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_mq={0x7, 0x1, 'mq\x00'}]}, 0x2c}}, 0x0) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000040)={r3, @multicast2, @loopback}, 0xc) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9, 0x1, 'cake\x00'}, {0xc, 0x2, [@TCA_CAKE_DIFFSERV_MODE={0x8, 0x3, 0x3}]}}]}, 0x3c}}, 0x0) 20:35:05 executing program 1: perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x100000000000000d, 0x6c00000000000000) 20:35:05 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x0, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:35:06 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = memfd_create(&(0x7f0000000680)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa0\x16\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2O\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc0\xdc\x14\xeb\f\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xf7v\x87\xbb\xaf\xaa\xf8\xd68\x813a/\xc41\xae\x14\"\x85\x99\x97\xed\xec\x13\x8a\xe2E\xab/\xd4TE\f\xe9<\".\xc6\xbcK\xf8T=6\'\x05u\x8f\x01\xb8\xce{\x9d\xb0\xee\x1e\x89\x13Ze\xa5\xf4\x16\x93\xaa\x19V\x10\x11?\x82|\x11#\x015\x836>x\x06\xbd7S\x9c!\xee\xf6\xa4\x9aqf\xe7-+(m\xaf\x1f\x8dzqW\b\xa5x\xf1r\xf1\xc6u\x8d\xd1@\xf2\xb0\x93\x98f)\x1e)K\x81\x90n\x9c\xcf5\xb9\xbc\x14\xd84/\x9c8[/\x99k\xa5\x9fc0j\xc1!\xec\xe2\xba\x1f\x8c\xe4\x1a\x83\x1b\x84> 5Ib\x8c\x8e`\x92\xcbc\xd5\x18\x80x\x15\xa5\x84\x1e\xd4\x86\x19\x1a\xbcU\xf4Da\xbaP\xa8\x8c0\xf9\xaa\x87q\t\xda\xca\nt\xc6F\x9a\xe4\xf5\x86\x97\xde\xe1\x12\x88\x01\xc1O\xd44=&\x8a\xa4|D\x00C\xa9z\xe1d/\xea\xcc@\xf2\x7f\"\'\xc5\'\xe1\x9a\xd1h.\xab', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r3) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) 20:35:06 executing program 1: perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x100000000000000e, 0x6c00000000000000) 20:35:06 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r3) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) 20:35:06 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x1ff}, 0x0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$VIDIOC_TRY_ENCODER_CMD(r1, 0xc028564e, &(0x7f0000000040)={0x1, 0x1, [0x7fffffff, 0x7f, 0x5262134c, 0xfff, 0x0, 0x401, 0xbaf, 0x6]}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xd) setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x1, &(0x7f0000000140)=0xd1, 0x4) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, 0x0}, 0x0) 20:35:06 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000000)=0x1, 0x1039c) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d003f00efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0xffffffffffffffd0, 0x401c005, 0x0, 0xffffffffffffff36) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000600)="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", 0xa44) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x12000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000280), 0x4) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, &(0x7f0000000200)={0x0, 0x0, {0x4, 0xfffff111, 0x200a, 0x6, 0xa, 0x3, 0x2}}) 20:35:06 executing program 1: perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x100000000000000f, 0x6c00000000000000) 20:35:06 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r3) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) 20:35:06 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r3) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) 20:35:06 executing program 1: perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000010, 0x6c00000000000000) 20:35:06 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.stat\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fallocate(r1, 0x10, 0x1, 0x2000402) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0xffffffffffffffff}) 20:35:06 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000680)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa0\x16\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2O\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc0\xdc\x14\xeb\f\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xf7v\x87\xbb\xaf\xaa\xf8\xd68\x813a/\xc41\xae\x14\"\x85\x99\x97\xed\xec\x13\x8a\xe2E\xab/\xd4TE\f\xe9<\".\xc6\xbcK\xf8T=6\'\x05u\x8f\x01\xb8\xce{\x9d\xb0\xee\x1e\x89\x13Ze\xa5\xf4\x16\x93\xaa\x19V\x10\x11?\x82|\x11#\x015\x836>x\x06\xbd7S\x9c!\xee\xf6\xa4\x9aqf\xe7-+(m\xaf\x1f\x8dzqW\b\xa5x\xf1r\xf1\xc6u\x8d\xd1@\xf2\xb0\x93\x98f)\x1e)K\x81\x90n\x9c\xcf5\xb9\xbc\x14\xd84/\x9c8[/\x99k\xa5\x9fc0j\xc1!\xec\xe2\xba\x1f\x8c\xe4\x1a\x83\x1b\x84> 5Ib\x8c\x8e`\x92\xcbc\xd5\x18\x80x\x15\xa5\x84\x1e\xd4\x86\x19\x1a\xbcU\xf4Da\xbaP\xa8\x8c0\xf9\xaa\x87q\t\xda\xca\nt\xc6F\x9a\xe4\xf5\x86\x97\xde\xe1\x12\x88\x01\xc1O\xd44=&\x8a\xa4|D\x00C\xa9z\xe1d/\xea\xcc@\xf2\x7f\"\'\xc5\'\xe1\x9a\xd1h.\xab', 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r3) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) [ 1623.917743] audit: type=1800 audit(5885210107.053:219): pid=31630 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="syz-executor.0" name="cpuacct.stat" dev="sda1" ino=17098 res=0 20:35:09 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x0, 0x10001, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:35:09 executing program 1: perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000011, 0x6c00000000000000) 20:35:09 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000680)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa0\x16\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2O\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc0\xdc\x14\xeb\f\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xf7v\x87\xbb\xaf\xaa\xf8\xd68\x813a/\xc41\xae\x14\"\x85\x99\x97\xed\xec\x13\x8a\xe2E\xab/\xd4TE\f\xe9<\".\xc6\xbcK\xf8T=6\'\x05u\x8f\x01\xb8\xce{\x9d\xb0\xee\x1e\x89\x13Ze\xa5\xf4\x16\x93\xaa\x19V\x10\x11?\x82|\x11#\x015\x836>x\x06\xbd7S\x9c!\xee\xf6\xa4\x9aqf\xe7-+(m\xaf\x1f\x8dzqW\b\xa5x\xf1r\xf1\xc6u\x8d\xd1@\xf2\xb0\x93\x98f)\x1e)K\x81\x90n\x9c\xcf5\xb9\xbc\x14\xd84/\x9c8[/\x99k\xa5\x9fc0j\xc1!\xec\xe2\xba\x1f\x8c\xe4\x1a\x83\x1b\x84> 5Ib\x8c\x8e`\x92\xcbc\xd5\x18\x80x\x15\xa5\x84\x1e\xd4\x86\x19\x1a\xbcU\xf4Da\xbaP\xa8\x8c0\xf9\xaa\x87q\t\xda\xca\nt\xc6F\x9a\xe4\xf5\x86\x97\xde\xe1\x12\x88\x01\xc1O\xd44=&\x8a\xa4|D\x00C\xa9z\xe1d/\xea\xcc@\xf2\x7f\"\'\xc5\'\xe1\x9a\xd1h.\xab', 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r3) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) 20:35:09 executing program 0: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000600)=0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000002c0)) r2 = syz_open_procfs(r1, &(0x7f00000000c0)='fd/3\x00') r3 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x181142, 0x0) ioctl$SOUND_MIXER_READ_STEREODEVS(r3, 0x80044dfb, &(0x7f0000000080)) io_submit(r0, 0x1, &(0x7f0000000a00)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r2, 0x0}]) 20:35:09 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3000003, 0x5c831, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000140)={0x2, &(0x7f0000000100)=[{}, {0x0}]}) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f00000001c0)={r2, 0x2}) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000040)={r2, 0x2}) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000d40)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcaa2, 0x0, 0x0, 0x0, 0xef9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x2], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff]}, 0x45c) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x4000000) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f00001da000/0x18000)=nil, 0x0, 0xfffffe72, 0x0, 0x0, 0xa00000000000000) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000000)) 20:35:09 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000680)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa0\x16\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2O\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc0\xdc\x14\xeb\f\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xf7v\x87\xbb\xaf\xaa\xf8\xd68\x813a/\xc41\xae\x14\"\x85\x99\x97\xed\xec\x13\x8a\xe2E\xab/\xd4TE\f\xe9<\".\xc6\xbcK\xf8T=6\'\x05u\x8f\x01\xb8\xce{\x9d\xb0\xee\x1e\x89\x13Ze\xa5\xf4\x16\x93\xaa\x19V\x10\x11?\x82|\x11#\x015\x836>x\x06\xbd7S\x9c!\xee\xf6\xa4\x9aqf\xe7-+(m\xaf\x1f\x8dzqW\b\xa5x\xf1r\xf1\xc6u\x8d\xd1@\xf2\xb0\x93\x98f)\x1e)K\x81\x90n\x9c\xcf5\xb9\xbc\x14\xd84/\x9c8[/\x99k\xa5\x9fc0j\xc1!\xec\xe2\xba\x1f\x8c\xe4\x1a\x83\x1b\x84> 5Ib\x8c\x8e`\x92\xcbc\xd5\x18\x80x\x15\xa5\x84\x1e\xd4\x86\x19\x1a\xbcU\xf4Da\xbaP\xa8\x8c0\xf9\xaa\x87q\t\xda\xca\nt\xc6F\x9a\xe4\xf5\x86\x97\xde\xe1\x12\x88\x01\xc1O\xd44=&\x8a\xa4|D\x00C\xa9z\xe1d/\xea\xcc@\xf2\x7f\"\'\xc5\'\xe1\x9a\xd1h.\xab', 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r3) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) 20:35:09 executing program 1: perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000012, 0x6c00000000000000) 20:35:09 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) memfd_create(&(0x7f0000000680)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa0\x16\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2O\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc0\xdc\x14\xeb\f\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xf7v\x87\xbb\xaf\xaa\xf8\xd68\x813a/\xc41\xae\x14\"\x85\x99\x97\xed\xec\x13\x8a\xe2E\xab/\xd4TE\f\xe9<\".\xc6\xbcK\xf8T=6\'\x05u\x8f\x01\xb8\xce{\x9d\xb0\xee\x1e\x89\x13Ze\xa5\xf4\x16\x93\xaa\x19V\x10\x11?\x82|\x11#\x015\x836>x\x06\xbd7S\x9c!\xee\xf6\xa4\x9aqf\xe7-+(m\xaf\x1f\x8dzqW\b\xa5x\xf1r\xf1\xc6u\x8d\xd1@\xf2\xb0\x93\x98f)\x1e)K\x81\x90n\x9c\xcf5\xb9\xbc\x14\xd84/\x9c8[/\x99k\xa5\x9fc0j\xc1!\xec\xe2\xba\x1f\x8c\xe4\x1a\x83\x1b\x84> 5Ib\x8c\x8e`\x92\xcbc\xd5\x18\x80x\x15\xa5\x84\x1e\xd4\x86\x19\x1a\xbcU\xf4Da\xbaP\xa8\x8c0\xf9\xaa\x87q\t\xda\xca\nt\xc6F\x9a\xe4\xf5\x86\x97\xde\xe1\x12\x88\x01\xc1O\xd44=&\x8a\xa4|D\x00C\xa9z\xe1d/\xea\xcc@\xf2\x7f\"\'\xc5\'\xe1\x9a\xd1h.\xab', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) 20:35:09 executing program 1: perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000013, 0x6c00000000000000) 20:35:09 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3000003, 0x5c831, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000140)={0x2, &(0x7f0000000100)=[{}, {0x0}]}) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f00000001c0)={r2, 0x2}) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000040)={r2, 0x2}) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000d40)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcaa2, 0x0, 0x0, 0x0, 0xef9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x2], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff]}, 0x45c) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x4000000) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f00001da000/0x18000)=nil, 0x0, 0xfffffe72, 0x0, 0x0, 0xa00000000000000) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000000)) 20:35:09 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) memfd_create(&(0x7f0000000680)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa0\x16\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2O\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc0\xdc\x14\xeb\f\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xf7v\x87\xbb\xaf\xaa\xf8\xd68\x813a/\xc41\xae\x14\"\x85\x99\x97\xed\xec\x13\x8a\xe2E\xab/\xd4TE\f\xe9<\".\xc6\xbcK\xf8T=6\'\x05u\x8f\x01\xb8\xce{\x9d\xb0\xee\x1e\x89\x13Ze\xa5\xf4\x16\x93\xaa\x19V\x10\x11?\x82|\x11#\x015\x836>x\x06\xbd7S\x9c!\xee\xf6\xa4\x9aqf\xe7-+(m\xaf\x1f\x8dzqW\b\xa5x\xf1r\xf1\xc6u\x8d\xd1@\xf2\xb0\x93\x98f)\x1e)K\x81\x90n\x9c\xcf5\xb9\xbc\x14\xd84/\x9c8[/\x99k\xa5\x9fc0j\xc1!\xec\xe2\xba\x1f\x8c\xe4\x1a\x83\x1b\x84> 5Ib\x8c\x8e`\x92\xcbc\xd5\x18\x80x\x15\xa5\x84\x1e\xd4\x86\x19\x1a\xbcU\xf4Da\xbaP\xa8\x8c0\xf9\xaa\x87q\t\xda\xca\nt\xc6F\x9a\xe4\xf5\x86\x97\xde\xe1\x12\x88\x01\xc1O\xd44=&\x8a\xa4|D\x00C\xa9z\xe1d/\xea\xcc@\xf2\x7f\"\'\xc5\'\xe1\x9a\xd1h.\xab', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) 20:35:09 executing program 1: perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000014, 0x6c00000000000000) 20:35:12 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x0, 0x0, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:35:12 executing program 1: perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000015, 0x6c00000000000000) 20:35:12 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) memfd_create(&(0x7f0000000680)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa0\x16\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2O\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc0\xdc\x14\xeb\f\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xf7v\x87\xbb\xaf\xaa\xf8\xd68\x813a/\xc41\xae\x14\"\x85\x99\x97\xed\xec\x13\x8a\xe2E\xab/\xd4TE\f\xe9<\".\xc6\xbcK\xf8T=6\'\x05u\x8f\x01\xb8\xce{\x9d\xb0\xee\x1e\x89\x13Ze\xa5\xf4\x16\x93\xaa\x19V\x10\x11?\x82|\x11#\x015\x836>x\x06\xbd7S\x9c!\xee\xf6\xa4\x9aqf\xe7-+(m\xaf\x1f\x8dzqW\b\xa5x\xf1r\xf1\xc6u\x8d\xd1@\xf2\xb0\x93\x98f)\x1e)K\x81\x90n\x9c\xcf5\xb9\xbc\x14\xd84/\x9c8[/\x99k\xa5\x9fc0j\xc1!\xec\xe2\xba\x1f\x8c\xe4\x1a\x83\x1b\x84> 5Ib\x8c\x8e`\x92\xcbc\xd5\x18\x80x\x15\xa5\x84\x1e\xd4\x86\x19\x1a\xbcU\xf4Da\xbaP\xa8\x8c0\xf9\xaa\x87q\t\xda\xca\nt\xc6F\x9a\xe4\xf5\x86\x97\xde\xe1\x12\x88\x01\xc1O\xd44=&\x8a\xa4|D\x00C\xa9z\xe1d/\xea\xcc@\xf2\x7f\"\'\xc5\'\xe1\x9a\xd1h.\xab', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) 20:35:12 executing program 0: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="dd04090000000000000100050000000000000002000020000004010000000000000000b49f1cf4ce3aef8929b6fe8222090000000000000059693799cde3404061b8fa203e7385e135e3148cfda57c4a61cf56fed6d5dd3002562d3040b01d5db56301000000254c42e854936bf6da4d83a19afc3ccfc76dfa696f7e6f9b664133f5fce5ca95ef0001000013b489dbd82e64540309"], 0x1) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$FS_IOC_GETFSLABEL(r0, 0x400452c8, &(0x7f0000000100)) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000002c0)) sched_getparam(r1, &(0x7f0000000000)) 20:35:12 executing program 3: ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f00000001c0)) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000140)={0x0, 0x14, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000440)}}, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4a202}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x204) r1 = memfd_create(&(0x7f0000000540)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf\x00\x00', 0x0) fcntl$setlease(r1, 0x400, 0x1) fcntl$setown(r1, 0x8, 0x0) execveat(r1, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$vcsu(0x0, 0x7, 0x40) write$FUSE_LSEEK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0xde6c1, 0x0) memfd_create(&(0x7f0000000040)='\x00', 0x0) read$eventfd(r2, 0x0, 0x0) 20:35:12 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000680)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa0\x16\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2O\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc0\xdc\x14\xeb\f\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xf7v\x87\xbb\xaf\xaa\xf8\xd68\x813a/\xc41\xae\x14\"\x85\x99\x97\xed\xec\x13\x8a\xe2E\xab/\xd4TE\f\xe9<\".\xc6\xbcK\xf8T=6\'\x05u\x8f\x01\xb8\xce{\x9d\xb0\xee\x1e\x89\x13Ze\xa5\xf4\x16\x93\xaa\x19V\x10\x11?\x82|\x11#\x015\x836>x\x06\xbd7S\x9c!\xee\xf6\xa4\x9aqf\xe7-+(m\xaf\x1f\x8dzqW\b\xa5x\xf1r\xf1\xc6u\x8d\xd1@\xf2\xb0\x93\x98f)\x1e)K\x81\x90n\x9c\xcf5\xb9\xbc\x14\xd84/\x9c8[/\x99k\xa5\x9fc0j\xc1!\xec\xe2\xba\x1f\x8c\xe4\x1a\x83\x1b\x84> 5Ib\x8c\x8e`\x92\xcbc\xd5\x18\x80x\x15\xa5\x84\x1e\xd4\x86\x19\x1a\xbcU\xf4Da\xbaP\xa8\x8c0\xf9\xaa\x87q\t\xda\xca\nt\xc6F\x9a\xe4\xf5\x86\x97\xde\xe1\x12\x88\x01\xc1O\xd44=&\x8a\xa4|D\x00C\xa9z\xe1d/\xea\xcc@\xf2\x7f\"\'\xc5\'\xe1\x9a\xd1h.\xab', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r3) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x1000) 20:35:12 executing program 1: perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000016, 0x6c00000000000000) 20:35:12 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x0, 0x0, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:35:13 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000680)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa0\x16\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2O\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc0\xdc\x14\xeb\f\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xf7v\x87\xbb\xaf\xaa\xf8\xd68\x813a/\xc41\xae\x14\"\x85\x99\x97\xed\xec\x13\x8a\xe2E\xab/\xd4TE\f\xe9<\".\xc6\xbcK\xf8T=6\'\x05u\x8f\x01\xb8\xce{\x9d\xb0\xee\x1e\x89\x13Ze\xa5\xf4\x16\x93\xaa\x19V\x10\x11?\x82|\x11#\x015\x836>x\x06\xbd7S\x9c!\xee\xf6\xa4\x9aqf\xe7-+(m\xaf\x1f\x8dzqW\b\xa5x\xf1r\xf1\xc6u\x8d\xd1@\xf2\xb0\x93\x98f)\x1e)K\x81\x90n\x9c\xcf5\xb9\xbc\x14\xd84/\x9c8[/\x99k\xa5\x9fc0j\xc1!\xec\xe2\xba\x1f\x8c\xe4\x1a\x83\x1b\x84> 5Ib\x8c\x8e`\x92\xcbc\xd5\x18\x80x\x15\xa5\x84\x1e\xd4\x86\x19\x1a\xbcU\xf4Da\xbaP\xa8\x8c0\xf9\xaa\x87q\t\xda\xca\nt\xc6F\x9a\xe4\xf5\x86\x97\xde\xe1\x12\x88\x01\xc1O\xd44=&\x8a\xa4|D\x00C\xa9z\xe1d/\xea\xcc@\xf2\x7f\"\'\xc5\'\xe1\x9a\xd1h.\xab', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r3) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x1000) 20:35:13 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x0, 0x0, 0x3, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:35:13 executing program 1: perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000017, 0x6c00000000000000) 20:35:13 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000680)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa0\x16\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2O\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc0\xdc\x14\xeb\f\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xf7v\x87\xbb\xaf\xaa\xf8\xd68\x813a/\xc41\xae\x14\"\x85\x99\x97\xed\xec\x13\x8a\xe2E\xab/\xd4TE\f\xe9<\".\xc6\xbcK\xf8T=6\'\x05u\x8f\x01\xb8\xce{\x9d\xb0\xee\x1e\x89\x13Ze\xa5\xf4\x16\x93\xaa\x19V\x10\x11?\x82|\x11#\x015\x836>x\x06\xbd7S\x9c!\xee\xf6\xa4\x9aqf\xe7-+(m\xaf\x1f\x8dzqW\b\xa5x\xf1r\xf1\xc6u\x8d\xd1@\xf2\xb0\x93\x98f)\x1e)K\x81\x90n\x9c\xcf5\xb9\xbc\x14\xd84/\x9c8[/\x99k\xa5\x9fc0j\xc1!\xec\xe2\xba\x1f\x8c\xe4\x1a\x83\x1b\x84> 5Ib\x8c\x8e`\x92\xcbc\xd5\x18\x80x\x15\xa5\x84\x1e\xd4\x86\x19\x1a\xbcU\xf4Da\xbaP\xa8\x8c0\xf9\xaa\x87q\t\xda\xca\nt\xc6F\x9a\xe4\xf5\x86\x97\xde\xe1\x12\x88\x01\xc1O\xd44=&\x8a\xa4|D\x00C\xa9z\xe1d/\xea\xcc@\xf2\x7f\"\'\xc5\'\xe1\x9a\xd1h.\xab', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r3) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x1000) 20:35:13 executing program 1: perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000018, 0x6c00000000000000) 20:35:13 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x0, 0x10001, 0x0, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:35:13 executing program 1: perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000019, 0x6c00000000000000) 20:35:14 executing program 1: perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x100000000000001a, 0x6c00000000000000) 20:35:14 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000680)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa0\x16\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2O\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc0\xdc\x14\xeb\f\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xf7v\x87\xbb\xaf\xaa\xf8\xd68\x813a/\xc41\xae\x14\"\x85\x99\x97\xed\xec\x13\x8a\xe2E\xab/\xd4TE\f\xe9<\".\xc6\xbcK\xf8T=6\'\x05u\x8f\x01\xb8\xce{\x9d\xb0\xee\x1e\x89\x13Ze\xa5\xf4\x16\x93\xaa\x19V\x10\x11?\x82|\x11#\x015\x836>x\x06\xbd7S\x9c!\xee\xf6\xa4\x9aqf\xe7-+(m\xaf\x1f\x8dzqW\b\xa5x\xf1r\xf1\xc6u\x8d\xd1@\xf2\xb0\x93\x98f)\x1e)K\x81\x90n\x9c\xcf5\xb9\xbc\x14\xd84/\x9c8[/\x99k\xa5\x9fc0j\xc1!\xec\xe2\xba\x1f\x8c\xe4\x1a\x83\x1b\x84> 5Ib\x8c\x8e`\x92\xcbc\xd5\x18\x80x\x15\xa5\x84\x1e\xd4\x86\x19\x1a\xbcU\xf4Da\xbaP\xa8\x8c0\xf9\xaa\x87q\t\xda\xca\nt\xc6F\x9a\xe4\xf5\x86\x97\xde\xe1\x12\x88\x01\xc1O\xd44=&\x8a\xa4|D\x00C\xa9z\xe1d/\xea\xcc@\xf2\x7f\"\'\xc5\'\xe1\x9a\xd1h.\xab', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r3) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x0) 20:35:14 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x0, 0x10001, 0x0, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:35:14 executing program 3: ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f00000001c0)) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000140)={0x0, 0x14, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000440)}}, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4a202}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x204) r1 = memfd_create(&(0x7f0000000540)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf\x00\x00', 0x0) fcntl$setlease(r1, 0x400, 0x1) fcntl$setown(r1, 0x8, 0x0) execveat(r1, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$vcsu(0x0, 0x7, 0x40) write$FUSE_LSEEK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0xde6c1, 0x0) memfd_create(&(0x7f0000000040)='\x00', 0x0) read$eventfd(r2, 0x0, 0x0) 20:35:14 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000680)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa0\x16\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2O\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc0\xdc\x14\xeb\f\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xf7v\x87\xbb\xaf\xaa\xf8\xd68\x813a/\xc41\xae\x14\"\x85\x99\x97\xed\xec\x13\x8a\xe2E\xab/\xd4TE\f\xe9<\".\xc6\xbcK\xf8T=6\'\x05u\x8f\x01\xb8\xce{\x9d\xb0\xee\x1e\x89\x13Ze\xa5\xf4\x16\x93\xaa\x19V\x10\x11?\x82|\x11#\x015\x836>x\x06\xbd7S\x9c!\xee\xf6\xa4\x9aqf\xe7-+(m\xaf\x1f\x8dzqW\b\xa5x\xf1r\xf1\xc6u\x8d\xd1@\xf2\xb0\x93\x98f)\x1e)K\x81\x90n\x9c\xcf5\xb9\xbc\x14\xd84/\x9c8[/\x99k\xa5\x9fc0j\xc1!\xec\xe2\xba\x1f\x8c\xe4\x1a\x83\x1b\x84> 5Ib\x8c\x8e`\x92\xcbc\xd5\x18\x80x\x15\xa5\x84\x1e\xd4\x86\x19\x1a\xbcU\xf4Da\xbaP\xa8\x8c0\xf9\xaa\x87q\t\xda\xca\nt\xc6F\x9a\xe4\xf5\x86\x97\xde\xe1\x12\x88\x01\xc1O\xd44=&\x8a\xa4|D\x00C\xa9z\xe1d/\xea\xcc@\xf2\x7f\"\'\xc5\'\xe1\x9a\xd1h.\xab', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r3) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x0) 20:35:14 executing program 3: ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f00000001c0)) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000140)={0x0, 0x14, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000440)}}, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4a202}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x204) r1 = memfd_create(&(0x7f0000000540)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf\x00\x00', 0x0) fcntl$setlease(r1, 0x400, 0x1) fcntl$setown(r1, 0x8, 0x0) execveat(r1, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$vcsu(0x0, 0x7, 0x40) write$FUSE_LSEEK(0xffffffffffffffff, 0x0, 0x0) r2 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0xde6c1, 0x0) memfd_create(&(0x7f0000000040)='\x00', 0x0) read$eventfd(r2, 0x0, 0x0) 20:35:14 executing program 1: perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x100000000000001b, 0x6c00000000000000) 20:35:15 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000680)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa0\x16\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2O\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc0\xdc\x14\xeb\f\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xf7v\x87\xbb\xaf\xaa\xf8\xd68\x813a/\xc41\xae\x14\"\x85\x99\x97\xed\xec\x13\x8a\xe2E\xab/\xd4TE\f\xe9<\".\xc6\xbcK\xf8T=6\'\x05u\x8f\x01\xb8\xce{\x9d\xb0\xee\x1e\x89\x13Ze\xa5\xf4\x16\x93\xaa\x19V\x10\x11?\x82|\x11#\x015\x836>x\x06\xbd7S\x9c!\xee\xf6\xa4\x9aqf\xe7-+(m\xaf\x1f\x8dzqW\b\xa5x\xf1r\xf1\xc6u\x8d\xd1@\xf2\xb0\x93\x98f)\x1e)K\x81\x90n\x9c\xcf5\xb9\xbc\x14\xd84/\x9c8[/\x99k\xa5\x9fc0j\xc1!\xec\xe2\xba\x1f\x8c\xe4\x1a\x83\x1b\x84> 5Ib\x8c\x8e`\x92\xcbc\xd5\x18\x80x\x15\xa5\x84\x1e\xd4\x86\x19\x1a\xbcU\xf4Da\xbaP\xa8\x8c0\xf9\xaa\x87q\t\xda\xca\nt\xc6F\x9a\xe4\xf5\x86\x97\xde\xe1\x12\x88\x01\xc1O\xd44=&\x8a\xa4|D\x00C\xa9z\xe1d/\xea\xcc@\xf2\x7f\"\'\xc5\'\xe1\x9a\xd1h.\xab', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r3) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x0) 20:35:15 executing program 4: syz_open_procfs(0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1ce2356a8f87e56f0bf8893cc7149595314"], 0x9d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x5, 0x2, 0x1, 0x0, 0x0, 0x0, 0x20800, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0xa10e, 0x3}, 0x8, 0x6, 0x0, 0x8, 0x0, 0x7f, 0x20}, 0x0, 0x7, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r2, r3, 0x0, 0x800009) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x10001, {{0x2, 0x4e24, @rand_addr=0x64010101}}}, 0x88) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, 0xffffffffffffffff, 0x0, 0x800009) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x3, 0x8, 0x4e, 0x0, 0x31e2f8c0, 0x60402, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1f, 0x6}, 0x0, 0x0, 0x10001, 0x0, 0x7fff, 0x3, 0x2}, 0x0, 0xf, 0xffffffffffffffff, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) 20:35:15 executing program 1: perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x100000000000001c, 0x6c00000000000000) 20:35:15 executing program 5 (fault-call:6 fault-nth:0): r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000680)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa0\x16\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2O\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc0\xdc\x14\xeb\f\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xf7v\x87\xbb\xaf\xaa\xf8\xd68\x813a/\xc41\xae\x14\"\x85\x99\x97\xed\xec\x13\x8a\xe2E\xab/\xd4TE\f\xe9<\".\xc6\xbcK\xf8T=6\'\x05u\x8f\x01\xb8\xce{\x9d\xb0\xee\x1e\x89\x13Ze\xa5\xf4\x16\x93\xaa\x19V\x10\x11?\x82|\x11#\x015\x836>x\x06\xbd7S\x9c!\xee\xf6\xa4\x9aqf\xe7-+(m\xaf\x1f\x8dzqW\b\xa5x\xf1r\xf1\xc6u\x8d\xd1@\xf2\xb0\x93\x98f)\x1e)K\x81\x90n\x9c\xcf5\xb9\xbc\x14\xd84/\x9c8[/\x99k\xa5\x9fc0j\xc1!\xec\xe2\xba\x1f\x8c\xe4\x1a\x83\x1b\x84> 5Ib\x8c\x8e`\x92\xcbc\xd5\x18\x80x\x15\xa5\x84\x1e\xd4\x86\x19\x1a\xbcU\xf4Da\xbaP\xa8\x8c0\xf9\xaa\x87q\t\xda\xca\nt\xc6F\x9a\xe4\xf5\x86\x97\xde\xe1\x12\x88\x01\xc1O\xd44=&\x8a\xa4|D\x00C\xa9z\xe1d/\xea\xcc@\xf2\x7f\"\'\xc5\'\xe1\x9a\xd1h.\xab', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r3) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) 20:35:15 executing program 1: perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x100000000000001d, 0x6c00000000000000) 20:35:15 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@cruft='cruft'}]}) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x0) shmctl$IPC_RMID(r0, 0x0) shmctl$SHM_STAT(r0, 0xd, &(0x7f00000003c0)=""/4096) shmat(r0, &(0x7f0000ffc000/0x2000)=nil, 0x2000) 20:35:15 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000680)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa0\x16\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2O\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc0\xdc\x14\xeb\f\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xf7v\x87\xbb\xaf\xaa\xf8\xd68\x813a/\xc41\xae\x14\"\x85\x99\x97\xed\xec\x13\x8a\xe2E\xab/\xd4TE\f\xe9<\".\xc6\xbcK\xf8T=6\'\x05u\x8f\x01\xb8\xce{\x9d\xb0\xee\x1e\x89\x13Ze\xa5\xf4\x16\x93\xaa\x19V\x10\x11?\x82|\x11#\x015\x836>x\x06\xbd7S\x9c!\xee\xf6\xa4\x9aqf\xe7-+(m\xaf\x1f\x8dzqW\b\xa5x\xf1r\xf1\xc6u\x8d\xd1@\xf2\xb0\x93\x98f)\x1e)K\x81\x90n\x9c\xcf5\xb9\xbc\x14\xd84/\x9c8[/\x99k\xa5\x9fc0j\xc1!\xec\xe2\xba\x1f\x8c\xe4\x1a\x83\x1b\x84> 5Ib\x8c\x8e`\x92\xcbc\xd5\x18\x80x\x15\xa5\x84\x1e\xd4\x86\x19\x1a\xbcU\xf4Da\xbaP\xa8\x8c0\xf9\xaa\x87q\t\xda\xca\nt\xc6F\x9a\xe4\xf5\x86\x97\xde\xe1\x12\x88\x01\xc1O\xd44=&\x8a\xa4|D\x00C\xa9z\xe1d/\xea\xcc@\xf2\x7f\"\'\xc5\'\xe1\x9a\xd1h.\xab', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r3) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) 20:35:15 executing program 1: perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x100000000000001e, 0x6c00000000000000) [ 1632.490047] ISOFS: Unable to identify CD-ROM format. [ 1632.569774] ------------[ cut here ]------------ [ 1632.574585] kernel BUG at fs/buffer.c:3065! [ 1632.595393] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 1632.600797] CPU: 0 PID: 31903 Comm: syz-executor.0 Not tainted 4.19.124-syzkaller #0 [ 1632.608683] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1632.618087] RIP: 0010:submit_bh_wbc+0x5e5/0x760 [ 1632.622772] Code: 10 4c 8d 7b 20 48 89 44 24 08 e9 3e fc ff ff e8 e1 59 b2 ff f0 80 63 01 f7 e9 4d fb ff ff e8 d2 59 b2 ff 0f 0b e8 cb 59 b2 ff <0f> 0b e8 c4 59 b2 ff 0f 0b e8 bd 59 b2 ff 0f 0b e8 b6 59 b2 ff 0f [ 1632.641704] RSP: 0018:ffff88820c8efa40 EFLAGS: 00010212 [ 1632.647077] RAX: 0000000000040000 RBX: ffff888032667150 RCX: ffffc90005ad6000 [ 1632.654362] RDX: 0000000000006502 RSI: ffffffff81b52f25 RDI: 0000000000000001 [ 1632.661640] RBP: 0000000000000000 R08: ffff88820bd500c0 R09: ffffed10064cce37 20:35:15 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000680)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa0\x16\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2O\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc0\xdc\x14\xeb\f\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xf7v\x87\xbb\xaf\xaa\xf8\xd68\x813a/\xc41\xae\x14\"\x85\x99\x97\xed\xec\x13\x8a\xe2E\xab/\xd4TE\f\xe9<\".\xc6\xbcK\xf8T=6\'\x05u\x8f\x01\xb8\xce{\x9d\xb0\xee\x1e\x89\x13Ze\xa5\xf4\x16\x93\xaa\x19V\x10\x11?\x82|\x11#\x015\x836>x\x06\xbd7S\x9c!\xee\xf6\xa4\x9aqf\xe7-+(m\xaf\x1f\x8dzqW\b\xa5x\xf1r\xf1\xc6u\x8d\xd1@\xf2\xb0\x93\x98f)\x1e)K\x81\x90n\x9c\xcf5\xb9\xbc\x14\xd84/\x9c8[/\x99k\xa5\x9fc0j\xc1!\xec\xe2\xba\x1f\x8c\xe4\x1a\x83\x1b\x84> 5Ib\x8c\x8e`\x92\xcbc\xd5\x18\x80x\x15\xa5\x84\x1e\xd4\x86\x19\x1a\xbcU\xf4Da\xbaP\xa8\x8c0\xf9\xaa\x87q\t\xda\xca\nt\xc6F\x9a\xe4\xf5\x86\x97\xde\xe1\x12\x88\x01\xc1O\xd44=&\x8a\xa4|D\x00C\xa9z\xe1d/\xea\xcc@\xf2\x7f\"\'\xc5\'\xe1\x9a\xd1h.\xab', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r3) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x2, 0x1000) 20:35:15 executing program 1: perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000021, 0x6c00000000000000) [ 1632.668917] R10: ffffed10064cce36 R11: ffff8880326671b3 R12: 0000000000000000 [ 1632.676191] R13: 0000000000000000 R14: 0000000000000000 R15: ffff8880505aae40 [ 1632.683488] FS: 00007f290ecbd700(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000 [ 1632.691721] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1632.697609] CR2: 0000000000768000 CR3: 0000000044138000 CR4: 00000000001426f0 [ 1632.704892] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1632.712184] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1632.719453] Call Trace: [ 1632.722060] __bread_gfp+0x136/0x240 [ 1632.725787] isofs_fill_super+0xb30/0x2a00 [ 1632.730041] ? __isofs_iget+0x2010/0x2010 [ 1632.734199] ? lock_downgrade+0x740/0x740 [ 1632.738359] ? lock_downgrade+0x740/0x740 [ 1632.742525] ? snprintf+0xbb/0xf0 [ 1632.745986] ? vsprintf+0x30/0x30 [ 1632.749452] ? wait_for_completion_io+0x10/0x10 [ 1632.754141] ? set_blocksize+0x299/0x320 [ 1632.758217] mount_bdev+0x2fc/0x3b0 [ 1632.761856] ? __isofs_iget+0x2010/0x2010 [ 1632.766014] mount_fs+0xa3/0x30c [ 1632.769392] vfs_kern_mount.part.0+0x68/0x400 [ 1632.773897] do_mount+0x4f4/0x2b50 [ 1632.777449] ? copy_mount_string+0x40/0x40 [ 1632.781697] ? rcu_read_lock_sched_held+0x10a/0x130 [ 1632.786723] ? kmem_cache_alloc_trace+0x356/0x3a0 [ 1632.791583] ? copy_mount_options+0x27a/0x390 [ 1632.796086] ksys_mount+0xd7/0x150 [ 1632.799632] __x64_sys_mount+0xba/0x150 [ 1632.803621] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1632.808215] do_syscall_64+0xf9/0x620 [ 1632.812029] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1632.817218] RIP: 0033:0x45f47a 20:35:16 executing program 3: r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') sendfile(r4, r5, 0x0, 0x800009) r6 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r5, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x2c, r6, 0x2, 0x70bd2a, 0x25dfdbff, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0xffff}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x5841) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) r8 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000002400ffffff7f000000003c0005000000", @ANYRES32=r7, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x40, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {}, {0xe}}, [@filter_kind_options=@f_flower={{0xb, 0x1, 'flower\x00'}, {0x10, 0x2, [@TCA_FLOWER_KEY_ETH_DST={0xa, 0x4, @remote}]}}]}, 0x40}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) [ 1632.820416] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1632.839326] RSP: 002b:00007f290ecbca68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1632.847046] RAX: ffffffffffffffda RBX: 0000000000508a00 RCX: 000000000045f47a [ 1632.854322] RDX: 00007f290ecbcae0 RSI: 0000000020000040 RDI: 00007f290ecbcb00 [ 1632.861625] RBP: 000000000078bf00 R08: 00007f290ecbcb40 R09: 00007f290ecbcae0 [ 1632.868903] R10: 0000000000000001 R11: 0000000000000206 R12: 00000000ffffffff [ 1632.876178] R13: 0000000000000bef R14: 00000000004ce30f R15: 00007f290ecbd6d4 [ 1632.883466] Modules linked in: 20:35:16 executing program 1: perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000022, 0x6c00000000000000) 20:35:16 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000680)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa0\x16\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2O\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc0\xdc\x14\xeb\f\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xba\xf7v\x87\xbb\xaf\xaa\xf8\xd68\x813a/\xc41\xae\x14\"\x85\x99\x97\xed\xec\x13\x8a\xe2E\xab/\xd4TE\f\xe9<\".\xc6\xbcK\xf8T=6\'\x05u\x8f\x01\xb8\xce{\x9d\xb0\xee\x1e\x89\x13Ze\xa5\xf4\x16\x93\xaa\x19V\x10\x11?\x82|\x11#\x015\x836>x\x06\xbd7S\x9c!\xee\xf6\xa4\x9aqf\xe7-+(m\xaf\x1f\x8dzqW\b\xa5x\xf1r\xf1\xc6u\x8d\xd1@\xf2\xb0\x93\x98f)\x1e)K\x81\x90n\x9c\xcf5\xb9\xbc\x14\xd84/\x9c8[/\x99k\xa5\x9fc0j\xc1!\xec\xe2\xba\x1f\x8c\xe4\x1a\x83\x1b\x84> 5Ib\x8c\x8e`\x92\xcbc\xd5\x18\x80x\x15\xa5\x84\x1e\xd4\x86\x19\x1a\xbcU\xf4Da\xbaP\xa8\x8c0\xf9\xaa\x87q\t\xda\xca\nt\xc6F\x9a\xe4\xf5\x86\x97\xde\xe1\x12\x88\x01\xc1O\xd44=&\x8a\xa4|D\x00C\xa9z\xe1d/\xea\xcc@\xf2\x7f\"\'\xc5\'\xe1\x9a\xd1h.\xab', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r3) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x301, 0x1000) [ 1632.931890] ---[ end trace ccdb1755e3d466f3 ]--- [ 1632.936908] RIP: 0010:submit_bh_wbc+0x5e5/0x760 [ 1632.941654] Code: 10 4c 8d 7b 20 48 89 44 24 08 e9 3e fc ff ff e8 e1 59 b2 ff f0 80 63 01 f7 e9 4d fb ff ff e8 d2 59 b2 ff 0f 0b e8 cb 59 b2 ff <0f> 0b e8 c4 59 b2 ff 0f 0b e8 bd 59 b2 ff 0f 0b e8 b6 59 b2 ff 0f [ 1632.968477] RSP: 0018:ffff88820c8efa40 EFLAGS: 00010212 [ 1632.973933] RAX: 0000000000040000 RBX: ffff888032667150 RCX: ffffc90005ad6000 [ 1632.995570] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1633.005804] RDX: 0000000000006502 RSI: ffffffff81b52f25 RDI: 0000000000000001 [ 1633.026647] RBP: 0000000000000000 R08: ffff88820bd500c0 R09: ffffed10064cce37 [ 1633.040986] R10: ffffed10064cce36 R11: ffff8880326671b3 R12: 0000000000000000 [ 1633.081140] R13: 0000000000000000 R14: 0000000000000000 R15: ffff8880505aae40 [ 1633.102048] FS: 00007f290ecbd700(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000 [ 1633.104472] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1633.119364] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1633.135366] CR2: 0000001b2f52c000 CR3: 0000000044138000 CR4: 00000000001426f0 [ 1633.142690] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1633.165800] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1633.186568] Kernel panic - not syncing: Fatal exception [ 1633.193248] Kernel Offset: disabled [ 1633.196876] Rebooting in 86400 seconds..